Cyber Warfare is a free and open source international intrusion detection and prevention advisory
☆19Aug 13, 2024Updated last year
Alternatives and similar repositories for Overview
Users that are interested in Overview are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆14Mar 19, 2018Updated 8 years ago
- OSINT license plate data by scraping lookup site(s)☆13Apr 2, 2023Updated 2 years ago
- ☆50Sep 24, 2020Updated 5 years ago
- Single cell STEM (scSTEM) is a shiny app based R package for visualizing and clustering genes in pseudotime ordered single cell RNA-seq d…☆20Jul 7, 2022Updated 3 years ago
- ☆15Nov 13, 2020Updated 5 years ago
- Tunneling SSH over HTTP☆10Mar 13, 2015Updated 11 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- Now you can download the most powerful tools using this simple script☆14Apr 27, 2019Updated 6 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Automatically load stolen cookies from ChromePass☆27Mar 19, 2021Updated 5 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Fork of OpenSearch Dashboards Security Plugin.☆12Mar 18, 2026Updated last week
- This tool is specially Designed for Termux Beginner users. This tool is very helpfull for Beginners. here simply type number of tool to…☆12Dec 3, 2019Updated 6 years ago
- This tool scans random SSH servers around the world and it tests the most used passwords☆14Dec 26, 2022Updated 3 years ago
- CPU Miner monero☆45Apr 10, 2018Updated 7 years ago
- docker image analyzer☆13Apr 8, 2025Updated 11 months ago
- C# Admin Control Panel Finder For Windows☆46Sep 23, 2019Updated 6 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- A compilation of snort rules for detecting malware traffic.☆16Feb 7, 2021Updated 5 years ago
- Totally anonymous botnet client with an emphasis on individual zombie control, resiliency of the host machine, and ease of remote code ex…☆18Jan 25, 2023Updated 3 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Mar 18, 2026Updated last week
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Retrieve IP Geolocation information☆13Feb 20, 2021Updated 5 years ago
- x64dbg Plugin SDK For x86 Assembler☆23Sep 10, 2018Updated 7 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Mar 26, 2021Updated 4 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago