Dataset Preview
Full Screen
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed
Error code:   DatasetGenerationError
Exception:    ArrowInvalid
Message:      Failed to parse string: '#registry' as a scalar of type double
Traceback:    Traceback (most recent call last):
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1870, in _prepare_split_single
                  writer.write_table(table)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 622, in write_table
                  pa_table = table_cast(pa_table, self._schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2292, in table_cast
                  return cast_table_to_schema(table, schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2245, in cast_table_to_schema
                  arrays = [
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2246, in <listcomp>
                  cast_array_to_feature(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in wrapper
                  return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1795, in <listcomp>
                  return pa.chunked_array([func(chunk, *args, **kwargs) for chunk in array.chunks])
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2102, in cast_array_to_feature
                  return array_cast(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1797, in wrapper
                  return func(array, *args, **kwargs)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 1949, in array_cast
                  return array.cast(pa_type)
                File "pyarrow/array.pxi", line 996, in pyarrow.lib.Array.cast
                File "/src/services/worker/.venv/lib/python3.9/site-packages/pyarrow/compute.py", line 404, in cast
                  return call_function("cast", [arr], options, memory_pool)
                File "pyarrow/_compute.pyx", line 590, in pyarrow._compute.call_function
                File "pyarrow/_compute.pyx", line 385, in pyarrow._compute.Function.call
                File "pyarrow/error.pxi", line 154, in pyarrow.lib.pyarrow_internal_check_status
                File "pyarrow/error.pxi", line 91, in pyarrow.lib.check_status
              pyarrow.lib.ArrowInvalid: Failed to parse string: '#registry' as a scalar of type double
              
              The above exception was the direct cause of the following exception:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1417, in compute_config_parquet_and_info_response
                  parquet_operations = convert_to_parquet(builder)
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1049, in convert_to_parquet
                  builder.download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 924, in download_and_prepare
                  self._download_and_prepare(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1000, in _download_and_prepare
                  self._prepare_split(split_generator, **prepare_split_kwargs)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1741, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1897, in _prepare_split_single
                  raise DatasetGenerationError("An error occurred while generating the dataset") from e
              datasets.exceptions.DatasetGenerationError: An error occurred while generating the dataset

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

keyword
string
metadata_keyword_regex
string
metadata_keyword_type
string
metadata_tool
string
metadata_description
string
metadata_tool_techniques
string
metadata_tool_tactics
string
metadata_malwares_name
null
metadata_groups_name
null
metadata_category
string
metadata_link
string
metadata_enable_endpoint_detection
int64
metadata_enable_proxy_detection
int64
metadata_tags
null
metadata_comment
null
metadata_severity_score
int64
metadata_popularity_score
int64
metadata_github_stars
null
metadata_github_forks
null
metadata_github_updated_at
null
metadata_github_created_at
null
*...::$index_allocation*
.{0,1000}\.\.\.\:\:\$index_allocation.{0,1000}
greyware_tool_keyword
$index_allocation
creation of hidden folders (and file) via ...$.......::$index_allocation
T1027.001 - T1564.001
TA0005
null
null
Defense Evasion
https://soroush.me/blog/2010/12/a-dotty-salty-directory-a-secret-place-in-ntfs-for-secret-files/
1
0
null
null
8
10
null
null
null
null
*cd *.::$index_allocation*
.{0,1000}cd\s.{0,1000}\.\:\:\$index_allocation.{0,1000}
greyware_tool_keyword
$index_allocation
creation of hidden folders (and file) via ...$.......::$index_allocation
T1027.001 - T1564.001
TA0005
null
null
Defense Evasion
https://soroush.me/blog/2010/12/a-dotty-salty-directory-a-secret-place-in-ntfs-for-secret-files/
1
0
null
null
8
10
null
null
null
null
*md *.::$index_allocation*
.{0,1000}md\s.{0,1000}\.\:\:\$index_allocation.{0,1000}
greyware_tool_keyword
$index_allocation
creation of hidden folders (and file) via ...$.......::$index_allocation
T1027.001 - T1564.001
TA0005
null
null
Defense Evasion
https://soroush.me/blog/2010/12/a-dotty-salty-directory-a-secret-place-in-ntfs-for-secret-files/
1
0
null
null
8
10
null
null
null
null
*0bin - encrypted pastebin*
.{0,1000}0bin\s\-\sencrypted\spastebin.{0,1000}
greyware_tool_keyword
0bin.net
Accessing a paste on 0bin.net
T1213 - T1190
TA0001 - TA0009 - TA0010
null
null
Collection
https://0bin.net
1
1
null
null
5
10
null
null
null
null
*A client side encrypted PasteBin*
.{0,1000}A\sclient\sside\sencrypted\sPasteBin.{0,1000}
greyware_tool_keyword
0bin.net
Accessing a paste on 0bin.net
T1213 - T1190
TA0001 - TA0009 - TA0010
null
null
Collection
https://0bin.net
1
1
null
null
5
10
null
null
null
null
*https://0bin.net/paste/*+*
.{0,1000}https\:\/\/0bin\.net\/paste\/.{0,1000}\+.{0,1000}
greyware_tool_keyword
0bin.net
Accessing a paste on 0bin.net
T1213 - T1190
TA0001 - TA0009 - TA0010
null
null
Collection
https://0bin.net
1
1
null
null
5
10
null
null
null
null
*https://0bin.net/paste/create*
.{0,1000}https\:\/\/0bin\.net\/paste\/create.{0,1000}
greyware_tool_keyword
0bin.net
Creating a paste on 0bin.net
T1213 - T1190
TA0001 - TA0009 - TA0010
null
null
Data Exfiltration
https://0bin.net
1
1
null
null
9
10
null
null
null
null
*/0d1n.c*
.{0,1000}\/0d1n\.c.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
null
null
null
null
null
null
*/0d1n_view*
.{0,1000}\/0d1n_view.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/bin/0d1n*
.{0,1000}\/bin\/0d1n.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/crlfinjection.txt*
.{0,1000}\/crlfinjection\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/dir_brute.txt*
.{0,1000}\/dir_brute\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/js_inject.txt*
.{0,1000}\/js_inject\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/ldap_injection.txt*
.{0,1000}\/ldap_injection\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/passive_sqli.txt*
.{0,1000}\/passive_sqli\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/password_brute.txt*
.{0,1000}\/password_brute\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/path_traversal.txt*
.{0,1000}\/path_traversal\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/path_traversal_win32.txt*
.{0,1000}\/path_traversal_win32\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/sqli.txt*
.{0,1000}\/sqli\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/xml_attack.txt*
.{0,1000}\/xml_attack\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/xml_attacks.txt*
.{0,1000}\/xml_attacks\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/xpath_injection.txt*
.{0,1000}\/xpath_injection\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/xss_robertux.txt*
.{0,1000}\/xss_robertux\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*/xxe_fuzz.txt*
.{0,1000}\/xxe_fuzz\.txt.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*0d1n * --post * --payloads *
.{0,1000}0d1n\s.{0,1000}\s\-\-post\s.{0,1000}\s\-\-payloads\s.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
0
null
null
7
null
null
null
null
null
*0d1n --host*
.{0,1000}0d1n\s\-\-host.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
0
null
null
7
null
null
null
null
null
*0d1n*kill_listener.sh*
.{0,1000}0d1n.{0,1000}kill_listener\.sh.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*CoolerVoid/0d1n*
.{0,1000}CoolerVoid\/0d1n.{0,1000}
offensive_tool_keyword
0d1n
Tool for automating customized attacks against web applications. Fully made in C language with pthreads it has fast performance.
T1583 - T1584 - T1190 - T1133
TA0002 - TA0007 - TA0040
null
null
Vulnerability Scanner
https://github.com/CoolerVoid/0d1n
1
1
null
null
7
null
null
null
null
null
*fcfhplploccackoneaefokcmbjfbkenj*
.{0,1000}fcfhplploccackoneaefokcmbjfbkenj.{0,1000}
greyware_tool_keyword
1clickVPN
External VPN usage within coporate network
T1090.003 - T1133 - T1572
TA0003 - TA0001 - TA0011 - TA0010 - TA0005
null
null
Data Exfiltration
https://raw.githubusercontent.com/SigmaHQ/sigma/43277f26fc1c81fc98fc79147b711189e901b757/rules/windows/registry/registry_set/registry_set_chrome_extension.yml
1
0
null
null
8
10
null
null
null
null
*www.1secmail.com/api/v1/?action=*
.{0,1000}www\.1secmail\.com\/api\/v1\/\?action\=.{0,1000}
greyware_tool_keyword
1secmail.com
using the API of 1secmail (temporary email service) could be abused by malicious actors - observed in SafeBreach-Labs/DoubleDrive tool
T1071.003
TA0005 - TA0001
null
null
Defense Evasion
https://www.1secmail.com/
1
1
null
null
10
10
null
null
null
null
*https://1ty.me/*
.{0,1000}https\:\/\/1ty\.me\/.{0,1000}
greyware_tool_keyword
1ty.me
temporary notes service - abused by attackers to share informations with their victims
T1105 - T1071
TA0010 - TA0009
null
null
Collection
https://1ty.me
1
1
null
null
10
10
null
null
null
null
*https://1ty.me/?mode=ajax&cmd=create_note*
.{0,1000}https\:\/\/1ty\.me\/\?mode\=ajax\&cmd\=create_note.{0,1000}
greyware_tool_keyword
1ty.me
temporary notes service - abused by attackers to share informations with their victims
T1105 - T1071
TA0010 - TA0009
null
null
Data Exfiltration
https://1ty.me
1
1
null
null
10
10
null
null
null
null
* 365-Stealer *
.{0,1000}\s365\-Stealer\s.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
* --custom-steal
.{0,1000}\s\-\-custom\-steal
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
* --custom-steal listusers*
.{0,1000}\s\-\-custom\-steal\slistusers.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
* --custom-steal onedrive*
.{0,1000}\s\-\-custom\-steal\sonedrive.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
* --custom-steal onenote*
.{0,1000}\s\-\-custom\-steal\sonenote.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
* --custom-steal outlook*
.{0,1000}\s\-\-custom\-steal\soutlook.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
* Redirect Url After Stealing ==> *
.{0,1000}\sRedirect\sUrl\sAfter\sStealing\s\=\=\>\s.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*/365-Stealer.git*
.{0,1000}\/365\-Stealer\.git.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
1
null
null
10
5
null
null
null
null
*[!] Looks like Victim * doesn't have office365 Licence!*
.{0,1000}\[!\]\sLooks\slike\sVictim\s.{0,1000}\sdoesn\'t\shave\soffice365\sLicence!.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*[!] Stealing processes delayed with *
.{0,1000}\[!\]\sStealing\sprocesses\sdelayed\swith\s.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*[!] Swithed to custom stealing. *
.{0,1000}\[!\]\sSwithed\sto\scustom\sstealing\.\s.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*[+] Victim * have office365 Licence!*
.{0,1000}\[\+\]\sVictim\s.{0,1000}\shave\soffice365\sLicence!.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*365-Stealer.py*
.{0,1000}365\-Stealer\.py.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
1
null
null
10
5
null
null
null
null
*365-Stealer-master*
.{0,1000}365\-Stealer\-master.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
1
null
null
10
5
null
null
null
null
*AlteredSecurity/365-Stealer*
.{0,1000}AlteredSecurity\/365\-Stealer.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
1
null
null
10
5
null
null
null
null
*cscript ..\\temp.vbs*
.{0,1000}cscript\s\.\.\\\\temp\.vbs.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*'Disable all http access logs'*
.{0,1000}\'Disable\sall\shttp\saccess\slogs\'.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*'Host the Phising App'*
.{0,1000}\'Host\sthe\sPhising\sApp\'.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*MIIEowIBAAKCAQEAvZtOCbMyFKJN3n89nctTfYLSeiCTNG01rAFl06hMkobyzr0c*
.{0,1000}MIIEowIBAAKCAQEAvZtOCbMyFKJN3n89nctTfYLSeiCTNG01rAFl06hMkobyzr0c.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*o365-Attack-Toolkit*
.{0,1000}o365\-Attack\-Toolkit.{0,1000}
offensive_tool_keyword
365-Stealer
365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack
T1111 - T1566.001 - T1078.004
TA0004 - TA0001 - TA0040
null
null
Phishing
https://github.com/AlteredSecurity/365-Stealer
1
0
null
null
10
5
null
null
null
null
*/3proxy-*.deb*
.{0,1000}\/3proxy\-.{0,1000}\.deb.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
1
null
null
8
10
null
null
null
null
*/3proxy-*.rpm*
.{0,1000}\/3proxy\-.{0,1000}\.rpm.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
1
null
null
8
10
null
null
null
null
*/3proxy-*.zip*
.{0,1000}\/3proxy\-.{0,1000}\.zip.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
1
null
null
8
10
null
null
null
null
*/3proxy.exe*
.{0,1000}\/3proxy\.exe.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
1
null
null
8
10
null
null
null
null
*/3proxy.git*
.{0,1000}\/3proxy\.git.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
1
null
null
8
10
null
null
null
null
*/3proxy.log*
.{0,1000}\/3proxy\.log.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
1
null
null
8
10
null
null
null
null
*/etc/3proxy/conf*
.{0,1000}\/etc\/3proxy\/conf.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\3proxy-*.deb*
.{0,1000}\\3proxy\-.{0,1000}\.deb.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\3proxy-*.rpm*
.{0,1000}\\3proxy\-.{0,1000}\.rpm.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\3proxy-*.zip*
.{0,1000}\\3proxy\-.{0,1000}\.zip.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\3proxy.cfg*
.{0,1000}\\3proxy\.cfg.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\3proxy.exe*
.{0,1000}\\3proxy\.exe.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\3proxy.key*
.{0,1000}\\3proxy\.key.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\3proxy.log*
.{0,1000}\\3proxy\.log.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*\bin\3proxy*
.{0,1000}\\bin\\3proxy.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*128s3proxy.key"*
.{0,1000}128s3proxy\.key\".{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*3proxy --install*
.{0,1000}3proxy\s\-\-install.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*3proxy --remove*
.{0,1000}3proxy\s\-\-remove.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*3proxy tiny proxy server*
.{0,1000}3proxy\stiny\sproxy\sserver.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*3proxy Windows Authentication plugin*
.{0,1000}3proxy\sWindows\sAuthentication\splugin.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*3proxy.exe --*
.{0,1000}3proxy\.exe\s\-\-.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*3proxy.service*
.{0,1000}3proxy\.service.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*3proxy/3proxy*
.{0,1000}3proxy\/3proxy.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
1
null
null
8
10
null
null
null
null
.{0,1000}3proxy\@3proxy\.org.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*add3proxyuser.sh*
.{0,1000}add3proxyuser\.sh.{0,1000}
greyware_tool_keyword
3proxy
3proxy - tiny free proxy server
T1090 - T1583 - T1001 - T1132
TA0040 - TA0001 - TA0005 - TA0006
null
null
Defense Evasion
https://github.com/3proxy/3proxy
1
0
null
null
8
10
null
null
null
null
*./snake
.{0,1000}\.\/snake
offensive_tool_keyword
3snake
Tool for extracting information from newly spawned processes
T1003 - T1110 - T1552 - T1505
TA0001 - TA0002 - TA0003
null
null
Credential Access
https://github.com/blendin/3snake
1
0
null
null
7
8
null
null
null
null
*/3snake.git*
.{0,1000}\/3snake\.git.{0,1000}
offensive_tool_keyword
3snake
Tool for extracting information from newly spawned processes
T1003 - T1110 - T1552 - T1505
TA0001 - TA0002 - TA0003
null
null
Credential Access
https://github.com/blendin/3snake
1
1
null
null
7
8
null
null
null
null
*/passwd_tracer.c*
.{0,1000}\/passwd_tracer\.c.{0,1000}
offensive_tool_keyword
3snake
Tool for extracting information from newly spawned processes
T1003 - T1110 - T1552 - T1505
TA0001 - TA0002 - TA0003
null
null
Credential Access
https://github.com/blendin/3snake
1
0
null
null
7
8
null
null
null
null
*/sudo_tracer.c*
.{0,1000}\/sudo_tracer\.c.{0,1000}
offensive_tool_keyword
3snake
Tool for extracting information from newly spawned processes
T1003 - T1110 - T1552 - T1505
TA0001 - TA0002 - TA0003
null
null
Credential Access
https://github.com/blendin/3snake
1
0
null
null
7
8
null
null
null
null
*/tracers_fuzzer.cc*
.{0,1000}\/tracers_fuzzer\.cc.{0,1000}
offensive_tool_keyword
3snake
Tool for extracting information from newly spawned processes
T1003 - T1110 - T1552 - T1505
TA0001 - TA0002 - TA0003
null
null
Credential Access
https://github.com/blendin/3snake
1
0
null
null
7
8
null
null
null
null
*3snake-master*
.{0,1000}3snake\-master.{0,1000}
offensive_tool_keyword
3snake
Tool for extracting information from newly spawned processes
T1003 - T1110 - T1552 - T1505
TA0001 - TA0002 - TA0003
null
null
Credential Access
https://github.com/blendin/3snake
1
1
null
null
7
8
null
null
null
null
*blendin/3snake*
.{0,1000}blendin\/3snake.{0,1000}
offensive_tool_keyword
3snake
Tool for extracting information from newly spawned processes
T1003 - T1110 - T1552 - T1505
TA0001 - TA0002 - TA0003
null
null
Credential Access
https://github.com/blendin/3snake
1
1
null
null
7
8
null
null
null
null
*vh.4everproxy.com/secure/*
.{0,1000}vh\.4everproxy\.com\/secure\/.{0,1000}
offensive_tool_keyword
4everproxy
proxy software that enables access to Tor Hidden Services by mean of common web browsers
T1090 - T1071
TA0001 - TA0005
null
null
Defense Evasion
https://www.4everproxy.com/
1
1
null
null
6
10
null
null
null
null
*www.4everproxy.com/tor-proxy*
.{0,1000}www\.4everproxy\.com\/tor\-proxy.{0,1000}
offensive_tool_keyword
4everproxy
proxy software that enables access to Tor Hidden Services by mean of common web browsers
T1090 - T1071
TA0001 - TA0005
null
null
Defense Evasion
https://www.4everproxy.com/
1
1
null
null
10
10
null
null
null
null
*4shared.com/*upload*
.{0,1000}4shared\.com\/.{0,1000}upload.{0,1000}
greyware_tool_keyword
4shared.com
Uploading on 4shared.com
T1105 - T1567 - T1071
TA0010
null
null
Data Exfiltration
4shared.com
1
1
null
null
9
8
null
null
null
null
*https://www.4shared.com/get/*
.{0,1000}https\:\/\/www\.4shared\.com\/get\/.{0,1000}
greyware_tool_keyword
4shared.com
Downloading a file from 4shared.com
T1105 - T1071 - T1125
TA0009
null
null
Collection
4shared.com
1
1
null
null
6
5
null
null
null
null
*7.exe a -mx3 ad.7z ad_*.txt*
.{0,1000}7\.exe\sa\s\-mx3\sad\.7z\sad_.{0,1000}\.txt.{0,1000}
offensive_tool_keyword
7zip
7zip command to zip results from adfind scans. attackers perform Active Directory collection using AdFind in batch scriptsfrom C:\Windows\Temp\adf\ or C:\temp\ and store output in CSV files
T1074.001 - T1083 - T1560.001 - T1105
TA0003 - TA0007 - TA0009
null
null
Exploitation tool
http://www.joeware.net/freetools/tools/adfind/index.htm
1
0
null
null
null
null
null
null
null
null
* -ServiceName "AADInternals"*
.{0,1000}\s\-ServiceName\s\"AADInternals\".{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*/AADInternals.git*
.{0,1000}\/AADInternals\.git.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
1
null
null
9
10
null
null
null
null
*\AADInternals\*
.{0,1000}\\AADInternals\\.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*\CloudShell.ps1*
.{0,1000}\\CloudShell\.ps1.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*\CloudShell_utils.ps1*
.{0,1000}\\CloudShell_utils\.ps1.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*\DCaaS_utils.ps1
.{0,1000}\\DCaaS_utils\.ps1
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*\InjectDLL.exe*
.{0,1000}\\InjectDLL\.exe.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*\PTASpy.dll*
.{0,1000}\\PTASpy\.dll.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*\PTASpy.ps1*
.{0,1000}\\PTASpy\.ps1.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*A little service to steal the AD FS DKM secret :)*
.{0,1000}A\slittle\sservice\sto\ssteal\sthe\sAD\sFS\sDKM\ssecret\s\:\).{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
*AADConnectProvisioningAgentWizard.exe*
.{0,1000}AADConnectProvisioningAgentWizard\.exe.{0,1000}
greyware_tool_keyword
AADInternals
AADInternals PowerShell module for administering Azure AD and Office 365
T1583 - T1558 - T1078 - T1136 - T1087 - T1114 - T1566 - T1056 - T1199 - T1098 - T1649 - T1621 - T1649
TA0006 - TA0003 - TA0004 - TA0005 - TA0007 - TA0009 - TA0011
null
null
Exploitation tool
https://github.com/Gerenios/AADInternals
1
0
null
null
9
10
null
null
null
null
End of preview.

No dataset card yet

Downloads last month
11