skylightcyber / shadowhammer
Files related to our research on ShadowHammer
☆23Updated 3 years ago
Alternatives and similar repositories for shadowhammer:
Users that are interested in shadowhammer are comparing it to the libraries listed below
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- An offensive Powershell console☆30Updated 9 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Volatility plugin to help identify DoublePulsar implant by listing the array of pointers SrvTransaction2DispatchTable from the srv.sys dr…☆16Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54Updated 3 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- Talk given at DerbyCon and RuxCon 2016☆22Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆72Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- ☆17Updated 5 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Quick and dirty System (Power)Shell using NamedPipe impersonation.☆43Updated 8 years ago
- ☆17Updated 7 years ago
- ~ BannerGrab☆26Updated 8 years ago
- Process HTTP Pcaps With YARA☆101Updated 11 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago