CrowdStrike / TortillaLinks
☆293Updated 8 years ago
Alternatives and similar repositories for Tortilla
Users that are interested in Tortilla are comparing it to the libraries listed below
Sorting:
- A collection of tools for dealing with TrickBot☆202Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Mirror of Shadowbrokers release from https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation☆444Updated 8 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆197Updated 8 years ago
- Tallow - Transparent Tor for Windows☆538Updated 3 years ago
- Cisco Talos MBR Filter Driver☆342Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆323Updated 2 years ago
- Panic button for protection against cold boot attacks☆141Updated 3 years ago
- EternalRocks worm☆458Updated 8 years ago
- Code written as part of our various malware investigations☆397Updated 4 months ago
- ☆425Updated 7 years ago
- Windows Remote Post Breach Tool via Telegram☆133Updated 7 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- Extracts passwords from a KeePass 2.x database, directly from memory.☆1,012Updated 9 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated 2 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler☆80Updated 5 years ago
- pastebin.com Content Monitoring Tool☆194Updated 12 years ago
- Athena Botnet Source Code☆150Updated 9 years ago
- A repository of tools and scripts related to malware analysis☆248Updated 8 years ago
- Automatically exported from code.google.com/p/creddump☆253Updated 6 years ago
- Auto Installer Script for Cuckoo Sandbox☆164Updated 7 years ago
- for the louise☆242Updated 4 years ago
- ☆102Updated 5 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- A fully functional DanderSpritz lab in 2 commands☆428Updated 6 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆385Updated 2 years ago
- A simple Tor enabled, multi-process SSH dictionary attack in Python3.☆18Updated 7 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆406Updated last year
- Python malware for pentesters that bypasses most antivirus (signature and heuristics) and IPS using sheer stupidity☆76Updated 11 years ago