MalRecon - Basic Malware Reconnaissance and Analysis Tool
☆26Jun 8, 2017Updated 8 years ago
Alternatives and similar repositories for malrecon
Users that are interested in malrecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Windows link file (shortcuts) examiner☆68Jun 9, 2024Updated last year
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆477Jun 16, 2023Updated 2 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Metasploit Framework☆26Feb 10, 2026Updated last month
- Docker container with tools for binary reverse engineering and exploitation.☆327May 4, 2021Updated 4 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Jul 13, 2017Updated 8 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago
- windows kernel vulnerability found by me☆89Aug 28, 2017Updated 8 years ago
- retrace is a versatile security vulnerability / bug discovery tool through monitoring and modifying the behavior of compiled binaries on …☆61Feb 14, 2022Updated 4 years ago