Saturday, July 24, 2021
Home Tags C2

Tag: C2

Must Need

ADAudit  : Powershell Script To Do Domain Auditing Automation

ADAudit : Powershell Script To Do Domain Auditing Automation

ADAudit is a PowerShell Script to perform a quick AD audit. If you have any decent powershell one liners that could...
GitMonitor : A Github Scanning System To Look For Leaked Sensitive Information Based On Rules

GitMonitor : A Github Scanning System To Look For Leaked Sensitive...

GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot...
Natlas : Scaling Network Scanning

Natlas : Scaling Network Scanning

You've got a lot of maps and they are getting pretty unruly. What do you do? You put them in a book...
Gcat

Gcat – Sneaking Backdoor Use Gmail As A Command &...

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired by the original PoC...
When technology tempts you to cheat on your partner

When technology tempts you to cheat on your partner

There is nothing wrong with having a Facebook or WhatsApp account, nor with having friends of the opposite sex, as long as...
Freki : Malware Analysis Platform

Freki : Malware Analysis Platform

Freki is a free and open-source malware analysis platform. Goals Facilitate malware analysis and reverse...
Bolt

Bolt : Cross-Site Request Forgery Scanner

Bolt is in beta phase of development which means there can be bugs. Any production use of this tool discouraged. Pull requests...