☆29Jan 19, 2023Updated 3 years ago
Alternatives and similar repositories for DNS-Exfiltrate
Users that are interested in DNS-Exfiltrate are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SANS Blue Team Pages☆13Apr 8, 2017Updated 9 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- async parser for JET☆25Nov 14, 2025Updated 5 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ParrotSec armhf image builder.☆11Jul 26, 2017Updated 8 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- ☆29May 16, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- This repo contains a series of challenges that get harder and harder to exploit☆16Jun 16, 2025Updated 10 months ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 9 months ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 3 years ago
- ☆23Apr 20, 2026Updated 2 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Two Apple-related Flipper Zero BLE sniffing demos☆29Jun 4, 2025Updated 11 months ago
- A python script for smart lightbulbs to show how badly you're losing money☆38Apr 28, 2025Updated last year
- Clean Indirect Syscalls with Hook Evasion & Return Address Spoofing.☆81Apr 30, 2026Updated last week
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 3 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- Command-line utility for managing PKI infrastructure☆14Aug 14, 2022Updated 3 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- Tool and Jupyter Notebook used in "Enhance Investigations Using LLM, Embeddings, and Clustering" SANS AI Cybersecurity Summit talk.☆18Mar 29, 2025Updated last year
- AWS audits, without screenshots☆37Updated this week
- socat version 2☆10Aug 30, 2012Updated 13 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆142Mar 22, 2026Updated last month
- LetMeOutOfYour.net Resources☆21Apr 11, 2026Updated 3 weeks ago
- ☆24Aug 30, 2019Updated 6 years ago
- Utilizng an MCP Server to communicate with your C2☆91May 15, 2025Updated 11 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- PowerShell scripts to create sandboxed or vulnerable environments using HyperV and AutomatedLab☆95Mar 12, 2026Updated last month
- ☆17Apr 15, 2024Updated 2 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Feb 28, 2019Updated 7 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 5 years ago
- Automatically create iSCSI targets for all drives except for a boot device☆26May 23, 2025Updated 11 months ago
- The samples referenced in my book, Evasive Malware (No starch Press)☆60Feb 20, 2026Updated 2 months ago
- Ansible scripts to build an attack box☆24Sep 24, 2018Updated 7 years ago