There are no reviews yet. Be the first to send feedback to the community and the maintainers!
C2Hunter
🦅 Use fingerprinting to actively hunt for Command and Control servers on Shodan. Process threat feeds from Abuse.ch services to create a local database of C2 servers.C2Detective
🔍 Application for detecting command and control (C2) communication through network traffic analysis.OhMyDoS
⛔ Console application abusing Wordpress API called XML-RPC and its functions with aim of Denial-of-Service.mailo
📬 Process EML and MSG file types and extract various Indicators of Compromise.kibanafu
🍜 Parse IP IoCs and build a search query for Kibana with defined parameters.redSnooper
⛓️ Redirect chain analysis tool with random user agents supporting VPN and TOR as a network configuration.quickToRelay
🧅 Automate the process of setting up a Middle/Guard Tor Relay on Debian.StegTools
🔎 Steganographic and steganalysis multi tool providing various functionalities in one place.SimpleReverseShell
🐚 Generate reverse shell payloads fast and easily.Love Open Source and this site? Check out how you can help us