Pinned Repositories
boopkit
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
bpfdoor-scanner
BPFDoor Scanner - Check for Compromised Hosts
Cloud-Katana
Unlocking Serverless Computing to Assess Security Controls
cloud-sniper
Cloud Security Operations Orchestrator
cotopaxi
Set of tools for security testing of Internet of Things devices using specific network IoT protocols
kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
kubestriker
A Blazing fast Security Auditing tool for Kubernetes
luda
Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed on a proxy and work in real time on all the traffic. LUDA can take a set of malicious and benign URLs and return a list of regexes ready to be deployed inline !
Pcap.Net
.NET wrapper for WinPcap written in C++/CLI and C#, which features almost all WinPcap features and includes a packet interpretation framework.
phishmonger
Phishing Framework for Pentesters
counterfeel's Repositories
counterfeel/boopkit
Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.
counterfeel/bpfdoor-scanner
BPFDoor Scanner - Check for Compromised Hosts
counterfeel/Cloud-Katana
Unlocking Serverless Computing to Assess Security Controls
counterfeel/cloud-sniper
Cloud Security Operations Orchestrator
counterfeel/cotopaxi
Set of tools for security testing of Internet of Things devices using specific network IoT protocols
counterfeel/kubesploit
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
counterfeel/kubestriker
A Blazing fast Security Auditing tool for Kubernetes
counterfeel/luda
Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs path by inspecting internet traffic. Moreover, deep learning models or even regular ML model do not fit for inline deployment in terms of running performance. However, regexes ( or YARA rules ) can be deployed on a proxy and work in real time on all the traffic. LUDA can take a set of malicious and benign URLs and return a list of regexes ready to be deployed inline !
counterfeel/Pcap.Net
.NET wrapper for WinPcap written in C++/CLI and C#, which features almost all WinPcap features and includes a packet interpretation framework.
counterfeel/phishmonger
Phishing Framework for Pentesters
counterfeel/prebuilt-multiarch-bin
prebuilt binaries for multiple architeture
counterfeel/Quasar
Remote Administration Tool for Windows
counterfeel/REW-sploit
Emulate and Dissect MSF and *other* attacks
counterfeel/sgxray
counterfeel/thistest
asdasdfdsf
counterfeel/vscode-maudit
Simple source code security audit helper