A traffic analyzer to evade Empire's communication from Anomaly-Based IDS
☆108Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for firstorder
Users that are interested in firstorder are comparing it to the libraries listed below
Sorting:
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Dec 24, 2019Updated 6 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- Stanford's Machine Learning Exercises☆12Apr 7, 2020Updated 5 years ago
- ☆32May 9, 2021Updated 4 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Jun 26, 2019Updated 6 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆633Jun 20, 2017Updated 8 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- an ultimate evidence wiper☆64Mar 30, 2015Updated 10 years ago
- ☆128May 22, 2023Updated 2 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆238Nov 8, 2019Updated 6 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆933Jun 1, 2021Updated 4 years ago
- Issues to consider when planning a red team exercise.☆616Aug 23, 2017Updated 8 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- A RADIUS authentication server audit tool☆79Oct 15, 2018Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- ☆198Mar 19, 2020Updated 5 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- ☆1,092May 1, 2019Updated 6 years ago
- Generates anti-sandbox analysis HTA files without payloads☆120Mar 16, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- ☆229May 10, 2018Updated 7 years ago