singe / yellowLinks
A simple binary wrapper for DNS canarytokens.
☆25Updated 3 years ago
Alternatives and similar repositories for yellow
Users that are interested in yellow are comparing it to the libraries listed below
Sorting:
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆100Updated 4 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 3 years ago
- SNIcat☆128Updated 4 years ago
- The Cloud Blocker☆108Updated 10 months ago
- Terraform script to deploy AD-based environment on Azure☆41Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆71Updated 3 years ago
- ☄️ go-out - A Golang egress buster.☆126Updated 2 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 6 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- A Go implementation of JARM☆120Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 4 months ago
- Stealthy data exfiltration via IPv6 covert channel☆103Updated 6 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- ☆50Updated 5 months ago
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- ☆22Updated 5 years ago
- Recog-Go: Pattern Recognition using Rapid7 Recog☆119Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 8 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Updated 3 years ago
- ☆108Updated 4 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- C# User Simulation☆33Updated 3 years ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago