splunk / ShellSweep
ShellSweeping the evil.
☆142Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for ShellSweep
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆248Updated last year
- PowerShell Script Analyzer☆66Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆109Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆87Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆103Updated 2 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆246Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆162Updated last week
- ☆155Updated 11 months ago
- https://lolad-project.github.io/☆62Updated 2 weeks ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆105Updated last month
- An interactive shell to spoof some LOLBins command line☆180Updated 9 months ago
- Living Off Security Tools☆41Updated 3 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆141Updated 2 months ago
- Different methods to get current username without using whoami☆172Updated 9 months ago
- Active C&C Detector☆150Updated last year
- ☆181Updated 9 months ago
- ☆36Updated 7 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆159Updated last week
- Scan vulnerable drivers on Windows with loldrivers.io☆163Updated last year
- An open-source self-hosted purple team management web application.☆241Updated 3 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆133Updated last month
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆146Updated last year
- ☆31Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆126Updated 6 months ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆126Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.☆221Updated 3 months ago