CirtkitTools for the Computer Incident Response Team 💻
Stars: ✭ 117 (-30.77%)
HindsightWeb browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+248.52%)
Signature BaseSignature base for my scanner tools
Stars: ✭ 1,212 (+617.16%)
PyexfilA Python Package for Data Exfiltration
Stars: ✭ 554 (+227.81%)
ProtonProton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-15.98%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+211.83%)
PhpsploitFull-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Stars: ✭ 1,188 (+602.96%)
VegileThis tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell
Stars: ✭ 478 (+182.84%)
TurbiniaAutomation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (+172.78%)
Etl ParserEvent Trace Log file parser in pure Python
Stars: ✭ 66 (-60.95%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+159.76%)
ThehiveTheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+1260.95%)
Mssqlproxymssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Stars: ✭ 433 (+156.21%)
CovertutilsA framework for Backdoor development!
Stars: ✭ 424 (+150.89%)
Green Hat SuiteGreen-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Stars: ✭ 112 (-33.73%)
ToratToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Stars: ✭ 415 (+145.56%)
AutotimelinerAutomagically extract forensic timeline from volatile memory dump
Stars: ✭ 54 (-68.05%)
SifterSifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+138.46%)
HerakeyloggerChrome Keylogger Extension | Post Exploitation Tool
Stars: ✭ 138 (-18.34%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+128.99%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (+513.61%)
Postexploits(windows) post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass etc..
Stars: ✭ 111 (-34.32%)
MemlabsEducational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+311.83%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (+108.88%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+486.98%)
Mac aptmacOS Artifact Parsing Tool
Stars: ✭ 329 (+94.67%)
ShhmonNeutering Sysmon via driver unload
Stars: ✭ 166 (-1.78%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+84.02%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+484.62%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+77.51%)
KiewtaiA port of Kaitai to the Hiew hex editor
Stars: ✭ 108 (-36.09%)
Windows Post ExploitationWindows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Stars: ✭ 296 (+75.15%)
PxenumA shell script that automatically performs a series of *NIX enumeration tasks.
Stars: ✭ 30 (-82.25%)
RecuperabitA tool for forensic file system reconstruction.
Stars: ✭ 280 (+65.68%)
MthcAll-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-20.71%)
DetectionlabelkDetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.
Stars: ✭ 273 (+61.54%)
Forensic ToolsCIRCL system forensic tools or a jumble of tools to support forensic
Stars: ✭ 27 (-84.02%)
InvizzzibleInviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (+58.58%)
Awesome ForensicsA curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+950.3%)
KuiperDigital Forensics Investigation Platform
Stars: ✭ 257 (+52.07%)
Ripv6Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-94.08%)
YobiYara Based Detection Engine for web browsers
Stars: ✭ 39 (-76.92%)
OrianaOriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Stars: ✭ 152 (-10.06%)
VanillaWindowsReferenceA repo that contains recursive directory listings (using PowerShell) of a vanilla (clean) install of every Windows OS version to compare and see what's been added with each update.
Stars: ✭ 24 (-85.8%)
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+434.91%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-60.95%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-48.52%)
soapylog file scrubber
Stars: ✭ 16 (-90.53%)
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+4486.98%)
hashlookup-forensic-analyserAnalyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
Stars: ✭ 43 (-74.56%)
SilenttrinityAn asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Stars: ✭ 1,767 (+945.56%)
ThreathuntingA Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Stars: ✭ 738 (+336.69%)
EnumdbRelational database brute force and post exploitation tool for MySQL and MSSQL
Stars: ✭ 167 (-1.18%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (-15.38%)
TimesketchCollaborative forensic timeline analysis
Stars: ✭ 1,795 (+962.13%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+641.42%)
BashfuscatorA fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
Stars: ✭ 690 (+308.28%)