A traffic analyzer to evade Empire's communication from Anomaly-Based IDS
☆108Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for firstorder
Users that are interested in firstorder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆32May 9, 2021Updated 4 years ago
- Stanford's Machine Learning Exercises☆12Apr 7, 2020Updated 6 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆32Aug 13, 2021Updated 4 years ago
- Use Markov Chains to obfuscate data as other data☆56Aug 3, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆412Dec 24, 2019Updated 6 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 11 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆944May 8, 2019Updated 6 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 11 years ago
- Post Exploitation agent which uses a browser to do C2 operations.☆103May 25, 2018Updated 7 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- a benchmarking&stressing tool that can send raw HTTP requests☆165Sep 24, 2022Updated 3 years ago
- wide range mass audit toolkit☆1,039Oct 3, 2018Updated 7 years ago
- This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.☆30Feb 20, 2017Updated 9 years ago
- A RADIUS authentication server audit tool☆79Oct 15, 2018Updated 7 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- A PowerShell example of the Windows zero day priv esc☆327Sep 12, 2018Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- an ultimate evidence wiper☆65Mar 30, 2015Updated 11 years ago
- ☆230May 10, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Feb 10, 2019Updated 7 years ago
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- automated poetry generator in Turkish☆97Jan 18, 2019Updated 7 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 8 years ago
- Issues to consider when planning a red team exercise.☆611Aug 23, 2017Updated 8 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆936Jun 1, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Yet Another Linux Virtual Machine for Mobile Application Pentesting and Mobile Malware Analysis☆115Apr 25, 2016Updated 10 years ago
- ☆19Dec 8, 2018Updated 7 years ago
- NLog Target for GrayLog2☆17Mar 29, 2019Updated 7 years ago
- Slides and Code for the BHUSA 2019 talk: Flying a False Flag☆240Nov 8, 2019Updated 6 years ago
- ARP ping detector on local network☆15Feb 3, 2013Updated 13 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,015Jul 3, 2018Updated 7 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆635Jun 20, 2017Updated 8 years ago