AgentSmith-HIDS : Open Source Host-based Intrusion Detection System

5 years ago

Technically, AgentSmith-HIDS is not a Host-based Intrusion Detection System (HIDS) due to lack of rule engine and detection function. However,…

Memhunter : Live Hunting Of Code Injection Techniques

5 years ago

Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and…

HerShell : Multiplatform Reverse Shell Generator

5 years ago

Hershell is a tool for simple TCP reverse shell written in Go. It uses TLS to secure the communications, and…

Check-LocalAdminHash : PowerShell Tool To Authenticate Multiple Hosts Over WMI Or SMB

5 years ago

Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password…

SharpStat : C# Utility That Uses WMI To Run CMD

5 years ago

SharpStat is a C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file,…

KsDumper : Dumping Processes Using The Power Of Kernel Space

5 years ago

KsDumper is a dumping processes using the power of kernel space. It is a custom driver that would allow me…

Yarasafe : SAFE Embeddings To Match Functions In Yara

5 years ago

YARASAFE is for automatic binary function similarity checks with Yara. SAFE is a tool developed to create Binary Functions Embedding…

How to Protect Yourself Against Common Password Attacks

5 years ago

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the…

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

5 years ago

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework…

TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

5 years ago

TAS is a tiny framework for easily manipulate the tty and create fake binaries. The framework has three main functions,…