soufianetahiri / ContiLeaksLinks
☆19Updated 3 years ago
Alternatives and similar repositories for ContiLeaks
Users that are interested in ContiLeaks are comparing it to the libraries listed below
Sorting:
- ☆100Updated 9 months ago
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- ☆69Updated 3 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- TA505+ Adversary Simulation☆65Updated 4 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- A repo to support the book☆108Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Updated 3 years ago
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- ☆79Updated 5 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Updated 4 years ago
- How to ARM Yourself - Bsides Tampa 2020☆14Updated 5 years ago
- ☆41Updated 5 years ago
- ☆9Updated 4 years ago
- Fraktal's Ransomware Emulator☆102Updated last year
- Protocol agnostic online password guessing API.☆83Updated 2 years ago
- ☆108Updated 3 years ago
- ☆53Updated 6 years ago
- ☄️ go-out - A Golang egress buster.☆129Updated last year
- Open-Source Collection of Social Engineering Pretexts☆139Updated last year
- Quick and dirty dynamic redirect.rules generator☆164Updated 2 years ago
- Machine Learning Network Share Password Hunting Toolkit☆127Updated 5 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆68Updated this week
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Updated 2 years ago
- Material for the "Hands-On BloodHound" Workshop☆109Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated last year
- ☆42Updated 4 years ago
- Malware vulnerability intel tool for third-party attackers☆121Updated 9 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- ☆48Updated 7 months ago