A traffic analyzer to evade Empire's communication from Anomaly-Based IDS
☆108Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for firstorder
Users that are interested in firstorder are comparing it to the libraries listed below
Sorting:
- ☆32May 9, 2021Updated 4 years ago
- Stanford's Machine Learning Exercises☆12Apr 7, 2020Updated 5 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- Use Markov Chains to obfuscate data as other data☆54Aug 3, 2016Updated 9 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆411Dec 24, 2019Updated 6 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- a benchmarking&stressing tool that can send raw HTTP requests☆165Sep 24, 2022Updated 3 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- A RADIUS authentication server audit tool☆79Oct 15, 2018Updated 7 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- an ultimate evidence wiper☆64Mar 30, 2015Updated 10 years ago
- ☆229May 10, 2018Updated 7 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- automated poetry generator in Turkish☆97Jan 18, 2019Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆933Jun 1, 2021Updated 4 years ago
- Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis☆115Apr 25, 2016Updated 9 years ago
- ☆20Dec 8, 2018Updated 7 years ago
- NLog Target for GrayLog2☆17Mar 29, 2019Updated 6 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆238Nov 8, 2019Updated 6 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,014Jul 3, 2018Updated 7 years ago