referefref / canarytokendetector
Detect and remove the presence of canary tokens
☆19Updated last year
Alternatives and similar repositories for canarytokendetector:
Users that are interested in canarytokendetector are comparing it to the libraries listed below
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- ☆17Updated last year
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated 11 months ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated last week
- self-hosted Azure OSINT tool☆27Updated 6 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆15Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆25Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆38Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆14Updated 4 months ago
- Ansible role that Installs Mythic☆14Updated 8 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆13Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- ☆24Updated 10 months ago
- Ansible Cobalt Strike (Docker)☆15Updated 3 years ago
- Kibana app for RedELK☆16Updated 2 years ago
- Nemesis agent for Mythic☆27Updated 6 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Updated last year
- Golang Implementation of Hell's gate☆17Updated last year
- Python tool to find vulnerable AD object and generating csv report☆14Updated 2 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- Bloodhound agent for Mythic☆17Updated 6 months ago
- ☆15Updated 5 months ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 8 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago