0utrider / malreconView external linksLinks
MalRecon - Basic Malware Reconnaissance and Analysis Tool
☆26Jun 8, 2017Updated 8 years ago
Alternatives and similar repositories for malrecon
Users that are interested in malrecon are comparing it to the libraries listed below
Sorting:
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Simple website to display the LAN status based on a nmap scan☆58Jan 5, 2023Updated 3 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Windows link file (shortcuts) examiner☆68Jun 9, 2024Updated last year
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Binary and Directory tree comparison tool using Fuzzy Hashing☆84Feb 4, 2015Updated 11 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Automated enumeration☆30Apr 14, 2021Updated 4 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆328May 4, 2021Updated 4 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- MS17-010 multithreading scanner written in python.☆75May 20, 2017Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆174Oct 11, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆199Nov 19, 2017Updated 8 years ago
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆479Jun 16, 2023Updated 2 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Dec 1, 2022Updated 3 years ago
- a radare2 plugin that decodes packets with Scapy☆33Nov 24, 2017Updated 8 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- windows kernel vulnerability found by me☆90Aug 28, 2017Updated 8 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 7 years ago