0x6d616d616e206272696769747465 / Nemesis
☆19Updated 7 years ago
Alternatives and similar repositories for Nemesis
Users that are interested in Nemesis are comparing it to the libraries listed below
Sorting:
- A tool to triage screenshots☆19Updated 7 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Updated 11 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 6 years ago
- Joomla User-Agent/X-Forwarded-For RCE☆17Updated 9 years ago
- USB key cleaner☆61Updated 7 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 4 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- Technical Notes☆16Updated 7 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Updated 8 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- first commit☆20Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 9 years ago
- Homographs: brutefind homographs within a font☆18Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- Web crawling and document processing through a usable interface.☆71Updated 7 years ago
- An attempt to document commonly believed misconceptions about Tor.☆14Updated 7 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- ☆31Updated 5 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆29Updated 2 years ago
- You'll never take me alive.☆86Updated 11 years ago