D09r / Malware-ScannerLinks
Malware & URL Scanner - A Chrome extension to lookup a Potentially Malicious Websites.
☆13Updated 4 years ago
Alternatives and similar repositories for Malware-Scanner
Users that are interested in Malware-Scanner are comparing it to the libraries listed below
Sorting:
- Python Pentest Tools☆22Updated last month
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Updated 6 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Updated 13 years ago
- ☆34Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Vulnerability Scanner☆11Updated 11 years ago
- The Bi-directional Link Extractor.☆53Updated 8 years ago
- Gathers public information on companies to highlight social engineering risk.☆30Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Updated 7 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- ☆33Updated last year
- Bypass XSS Reflected Cross-site scripting☆33Updated 10 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆55Updated last year
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- A rogue DNS detector☆24Updated 2 months ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Updated 8 years ago
- Arp spoof detection tool☆26Updated 8 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Updated 7 years ago
- SSH & Basic Web Applications brute-forcing attempts are visible in your mailbox with this tool.☆19Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- buffer overflow examples☆23Updated 8 years ago
- W3C Standards Vulnerability Disclosure & Handling Process and Policy☆25Updated 3 weeks ago
- An Intro to Penetration Testing Workshop☆15Updated 7 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago