Files related to our research on ShadowHammer
☆23Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for shadowhammer
Users that are interested in shadowhammer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 5 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Windows PowerShell enumeration toolset for analyzing system configurations.☆22Apr 30, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- ☆19May 31, 2017Updated 8 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 7 years ago
- Remote Java classpath enumeration via deserialization☆22May 23, 2023Updated 2 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- A Splunker’s guide to containers☆12Dec 21, 2019Updated 6 years ago
- ☆16Apr 16, 2017Updated 9 years ago
- Malleable C2 profiles for Cobalt Strike☆76Sep 9, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- The Dragonfly badge as seen at DEFCON26☆21Aug 12, 2018Updated 7 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆71Mar 27, 2023Updated 3 years ago
- create docset for Dash (http://kapeli.com/dash) with splunk search language☆15Sep 26, 2017Updated 8 years ago
- Fluentd input plugin which queries Kubernetes kubelet summary API to collect Kubernetes metrics.☆12Jun 25, 2025Updated 10 months ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Jan 25, 2016Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Jun 13, 2021Updated 4 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- Real-time dashboards, graphs, and analytics for Philadelphia's Regional Rail train system.☆15Sep 9, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- ☆25Aug 14, 2025Updated 8 months ago
- A place to store sample data files for Splunk☆15Aug 3, 2018Updated 7 years ago
- Move frozen buckets to AWS S3 (and ultimately Glacier) for long term storage☆13Sep 28, 2017Updated 8 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 3 months ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- Python client for RiskIQ API services☆17Sep 7, 2018Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆27Feb 23, 2015Updated 11 years ago
- Splunk 7 Essentials - Third Edition, published by Packt☆17Jan 18, 2023Updated 3 years ago
- ☆15Nov 29, 2022Updated 3 years ago
- ☆21Mar 24, 2015Updated 11 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- Project to classify job application emails automatically into rejects and not rejects.☆11Feb 2, 2018Updated 8 years ago