tianyulab / Hunting_lateral_movementView external linksLinks
《横向移动攻击与检测技术》专栏文章
☆17Sep 5, 2019Updated 6 years ago
Alternatives and similar repositories for Hunting_lateral_movement
Users that are interested in Hunting_lateral_movement are comparing it to the libraries listed below
Sorting:
- ☆14Nov 2, 2023Updated 2 years ago
- WEB 跨域postMessage() 漏洞挖掘工具,基本原理:使用AJAX 获取页面代码,结合iframe 和data 协议构造测试环境,然后在iframe 下的window.onmessage 中插入hook 监控onmessage 的参数,最后通过能否被原来的onme…☆11Sep 13, 2016Updated 9 years ago
- ZZCMS v8.2-重装GETSHELL工具☆11May 8, 2018Updated 7 years ago
- 天御攻防实验室 - 威胁猎杀实战系列☆102Jul 4, 2019Updated 6 years ago
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆17Jan 27, 2026Updated 2 weeks ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- 用于应急演练或技术分享或者内训☆24Jan 8, 2020Updated 6 years ago
- agent 部分使用go 开发而成,采用插件模式开发而成,配置部分以及agent存活使用etcd。☆20Aug 2, 2021Updated 4 years ago
- 扫描C段或B段常见的Web端口并提取title,程序内置常见的Web端口,可自行添加。Scan common web ports and extract titles. The built-in common web port can be added by yoursel…☆20Sep 13, 2018Updated 7 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆24Sep 1, 2019Updated 6 years ago
- 安全编排与自动化响应平台☆62Dec 16, 2020Updated 5 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 基于 LARAVEL 打造的安全应急响应中心平台☆69Feb 17, 2017Updated 8 years ago
- 一个关于人工智能渗透测试分析系列☆209Mar 10, 2020Updated 5 years ago
- Evading Provenance-Based ML Detectors with Adversarial System Actions☆35Aug 18, 2024Updated last year
- autoType enable☆36Sep 21, 2019Updated 6 years ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 4 years ago
- ☆10Aug 18, 2021Updated 4 years ago
- 本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。☆313Oct 28, 2017Updated 8 years ago
- Asteroid 后端☆33Mar 15, 2021Updated 4 years ago
- The Whitepaper For Enterprise Security created by Monster Zero Team☆36Jun 3, 2017Updated 8 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆255May 12, 2020Updated 5 years ago
- ☆22Aug 29, 2025Updated 5 months ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Challenge handouts, source code, and solutions for UofTCTF 2026☆35Jan 13, 2026Updated last month
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- Get user information of a Twitter user.☆21May 20, 2018Updated 7 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 8 years ago
- This repo stores all challenges and writeups of CTFs we have participated in☆35Dec 16, 2018Updated 7 years ago
- Suricata rules for network anomaly detection☆184Feb 7, 2026Updated last week
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Nov 7, 2023Updated 2 years ago
- 一个半自动化命令注入漏洞Fuzz工具(One Semi-automation command injection vulnerability Fuzz tool)☆92Sep 28, 2017Updated 8 years ago
- Created a Telegram Bot that will send message after every Epoch regarding Training & Validation Accuracy, Loss and Graph too.☆11Sep 6, 2020Updated 5 years ago
- An interactive ChatGPT-powered command line tool that generates commands using natural language. z-cli 是一个基于 ChatGPT 的交互式命令行工具,支持用户输入自然语言…☆12Apr 11, 2023Updated 2 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago