13 skills found
D00Movenok / BounceBack↕️🤫 Stealth redirector for your red team operation security
ahmedkhlief / NinjaOpen source C2 server created for stealth red team operations
ibaiC / SafeHarbor BOFSafe Harbor is a BOF that streamlines process reconnaissance for red team operations by identifying trusted, low-noise targets to maintain stealth and robust OPSEC.
ProcessusT / VolchockC2VolchockC2 is a custom-built Command & Control (C2) framework, currently under active development. Designed for red team operations and adversary simulation, VolchockC2 focuses on flexibility, stealth, and efficient post-exploitation capabilities.
toxy4ny / Thc ScalpelStealth Reconnaissance Toolkit for Red Team Operations
Deji118 / FINAL YEAR PROJECT FDIADesign of stealth algorithms to corrupt the safe operation of the the power system. This is my Final year project at The University of Lagos. This research examines the vulnerability of the power system to a data integrity attack. I modeled the whole system using MATLAB. This research forms a basis for the development of suitable countermeasures against such vulnerabilities
maruf009sultan / FLUCKYFlucky - Advanced Bluetooth HID Attack Platform 🦆 Professional-grade wireless security testing tool featuring automatic BLE connectivity, psychological awareness testing, LOLBAS integration, and military-grade encryption. Built exclusively for authorized red teams, academic research, security awareness training, and educational purposes.
byt3n33dl3 / SharkMapExecUsed to be C2-agents and implants for stealth operation tools for BlackMarlinExec.
kxyznew / WiFi Pineapple Pager Master Control Suite## Key Features: - **Tri-Band Attacks**: 2.4GHz, 5GHz, 6GHz simultaneous operations - **Autonomous Mode**: Run without continuous computer connection - **Rubber Ducky Integration**: Deploy HID attacks directly from Pager - **Modular Expansion**: GPS, Bluetooth, LTE, SDR support - **Stealth Operations**: Passive reconnaissance and covert channels
MottaSec / MottaHunterMottaHunter: Advanced email reconnaissance tool for security professionals. Hunt emails across Google, Twitter, and LinkedIn, validate via SMTP, and generate smart permutations. Features rate limiting, catch-all detection, and permutation splitting for stealth operations.
exploide / WebshellsMy webshells with autofocus, output escaping, shell history, stealth password, file operations, ...
sumododda / Intrusion Detection System Based On AnomalyDigital assaults assurance or discovery is by and by among the most testing research subjects of data security, while dramatically expanding in number of close to nothing, remote based associated gadgets ready to send individual data to the Web it is sitting idle yet causing the fight between the included individuals. Thus, this assurance gets significant with ordinary Internet of Things arrangement, as it oftentimes incorporates numerous IOT based information assets speaking with actual world inside the different application spaces, similar to horticulture, medical care, home computerization, and so on Lamentably, contemporary IoT based gadgets frequently offer an extremely restricted security determinations, exposing themselves to always new and more confounded assaults and furthermore hindering anticipated worldwide selection of the IoT innovations, also the great many the IoT gadgets previously delivered with no equipment security uphold. In this unique circumstance, it is fundamental to improve devices which can identify such digital assaults Interruption location is the way toward observing the functions happening in a PC framework or network and investigating them for indications of interruption. It expects to ensure the privacy, honesty, and accessibility of basic arranged data frameworks. Interruption location framework (IDS) is a framework that assembles and investigates data from different regions inside a PC or an organization to distinguish assaults made against these parts. The IDS utilizes various conventional strategies for checking the misuses of weaknesses. Present day, airplanes are made sure about by solid and wellbeing properties, prepared administrators, measure based safety efforts. Be that as it may, considering late development in the inflight administration towards the expanded network, the asset sharing and progressed amusement functionalities, along with increment of dangers focusing on installed frameworks, the possible malignant alteration of an airplane framework must be truly considered for future frameworks. In this specific circumstance, numerous arrangements can be produced for airplane security. Specifically, Host based Intrusion Detection Systems are appropriate to manage the focused on dangers like an insider-assault Intrusion detection systems are almost absolutely necessary in all types of networks to provide protection from intruders. Intrusion detection systems (IDS) have to process a lot of packets to detect any intrusion which causes a delay in detection and mitigation. A host-based IDS with rule structure generation and pattern matching algorithm sets the rule structure for the unknown attack by using association rule mining in the map reduce framework. It occurs in two different stages. An intellectual method is used to generate an efficacious rule in the first stage and a pattern matching algorithm is brute forced in the second stage of this proposed framework. Log reviewing and auditing is required to find any malicious activity. Windows is the most popular operating system in the world for personal computing needs. So, there are a large number of attacks happening every day on these systems and the built-in signaturebased detection methods are not suitable for detection of zero-day and stealth attacks. Intrusion based system based on anomaly Unfortunately, a comprehensive dataset that can identify surface operations and attacks are not available. To solve this, we are going to use Australian Defense Force Academy Windows Data Set with a Stealth Attacks Addendum (ADFA-WD: SAA). To make use of this dataset a highly intelligent host based intrusion detection system is required
PhantomCode-CyberReign / Wifi Phantom Trap"Shadow Phantom SIGINT Operator Profile: An advanced offensive security toolkit designed for deep network surveillance, threat analysis, and cyber reconnaissance. Built with Python & Bash for stealth operations and educational hacking. Empower your cyber warfare skills ethically."