Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.
☆36Feb 28, 2022Updated 4 years ago
Alternatives and similar repositories for MalwareChecker
Users that are interested in MalwareChecker are comparing it to the libraries listed below
Sorting:
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23May 6, 2022Updated 3 years ago
- Adaptive eXocortex & Integrated Outer Memory Framework☆34Mar 15, 2020Updated 6 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- ☆79Jun 7, 2022Updated 3 years ago
- ☆11Jul 18, 2022Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- Heroes of newerth scripting pack☆18Jan 21, 2023Updated 3 years ago
- Active Directory Penetration Testing Tool☆29Nov 18, 2021Updated 4 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- 0x94TR Burp Extension - Java version☆31Sep 26, 2020Updated 5 years ago
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- ☆14Apr 29, 2020Updated 5 years ago
- XSS Finder Tool☆13Aug 25, 2016Updated 9 years ago
- ☆10Mar 27, 2022Updated 3 years ago
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- Powershell üzerinde verilen problemleri çözümlediğim , komut açıklamaları yaptığım powershell ile ilgili bir türkçe kaynak.☆20Oct 2, 2020Updated 5 years ago
- ☆14Jul 15, 2018Updated 7 years ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 4 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Mar 17, 2021Updated 5 years ago
- Simple directory brute-force tool written with python.☆40Sep 30, 2025Updated 5 months ago
- ☆12Oct 4, 2022Updated 3 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 5 years ago
- Malware hashes for open source projects.☆87Jan 28, 2025Updated last year
- Network security analysis tool with nmap scripts for termux ...☆50Jan 18, 2022Updated 4 years ago
- Linux Essentials☆17Jan 17, 2013Updated 13 years ago
- ☆14Oct 17, 2023Updated 2 years ago
- MySQL'de kullanılan komutların açıklamalarını içeren doküman☆12Oct 9, 2017Updated 8 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Idiomatic way to fill structs with options logic☆13Feb 13, 2022Updated 4 years ago
- Bypass TPM and SecureBoot Check in Windows 11 Installation.☆11Mar 9, 2023Updated 3 years ago
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆19Dec 23, 2020Updated 5 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- Welcome! I'm Alparslan Akyıldız, an author focusing on cybersecurity and technology. Explore my guides, books, and texts designed to simp…☆72Mar 26, 2025Updated 11 months ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- ☆11Jul 13, 2022Updated 3 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago