504 VSAgent
☆25Feb 21, 2018Updated 8 years ago
Alternatives and similar repositories for 504vsa
Users that are interested in 504vsa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 3 months ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆48Sep 4, 2018Updated 7 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Oct 25, 2018Updated 7 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- viewssld is a free, open source, non-terminating SSLv2/SSLv3/TLS traffic decryption daemon for Snort, and other Network Intrusion Detecti…☆74Aug 13, 2017Updated 8 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆41Apr 22, 2022Updated 3 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆32Jan 28, 2026Updated last month
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆68Feb 9, 2018Updated 8 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- ☆11Oct 21, 2020Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ☆34Nov 16, 2023Updated 2 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆12Mar 25, 2021Updated 4 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆20Feb 10, 2026Updated last month
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Comprehensive templates and tools for setting up Claude Code workflows☆18Jul 15, 2025Updated 8 months ago
- mobile site to help look up flavor pairings☆27Jun 20, 2013Updated 12 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE☆58Mar 13, 2020Updated 6 years ago
- moduled sniffer TCP/UDP Proxy for man-in-the-middle attack☆16Aug 8, 2018Updated 7 years ago
- Repo for the paper "USB Devices phoning home"☆22Feb 12, 2016Updated 10 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Binarly SDK v1☆14Dec 18, 2016Updated 9 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆34Mar 7, 2022Updated 4 years ago
- Identify Azure blobs using a wordlist of account name and container name strings☆45Mar 13, 2025Updated last year
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- ☆10Apr 29, 2022Updated 3 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- Links to resources for ML(M)s.☆10Jan 26, 2020Updated 6 years ago