a low(zero) cost threat intelligence&response tool against phishing domains
☆157Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for jeopardize
Users that are interested in jeopardize are comparing it to the libraries listed below
Sorting:
- ☆32May 9, 2021Updated 4 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆108Aug 13, 2018Updated 7 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆136Dec 21, 2019Updated 6 years ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- python version of "house party protocol" program☆24Mar 30, 2015Updated 10 years ago
- .Net Assembly to block ETW telemetry in current process☆81May 14, 2020Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc☆647Jan 23, 2025Updated last year
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- A simple embedded Linux backdoor.☆199Oct 25, 2020Updated 5 years ago
- Microsoft External Attack Tool☆178Dec 8, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆355Dec 1, 2020Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 3 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆137Jun 6, 2019Updated 6 years ago
- FACT is a tool to collect, process and visualise forensic data from clusters of machines running in the cloud or on-premise.☆17Aug 30, 2024Updated last year
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆161Apr 19, 2020Updated 5 years ago
- Test Blue Team detections without running any attack.☆271May 2, 2024Updated last year
- Web Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to …☆761Sep 23, 2024Updated last year
- Overlord - Red Teaming Infrastructure Automation☆627May 28, 2024Updated last year
- Words list generator to crack security tokens☆110May 20, 2020Updated 5 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Jun 26, 2019Updated 6 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Jul 10, 2018Updated 7 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- For all your network pentesting needs☆154Jun 26, 2024Updated last year
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- An epic web shell☆83Jun 10, 2025Updated 8 months ago
- Endpoint detection & Malware analysis software☆230Dec 20, 2019Updated 6 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago