EncryptedHelloKitty / MALSIS-CVELinks
Automated Malware Behavior Analysis Tool
☆11Updated last week
Alternatives and similar repositories for MALSIS-CVE
Users that are interested in MALSIS-CVE are comparing it to the libraries listed below
Sorting:
- ☆18Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated last year
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Yet Another Memory Analyzer for malware detection☆24Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆24Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆22Updated last year
- Structured CSVs and table schemas extracted from the 29-April-2025 LockBit affiliate-panel database leak.☆24Updated 2 months ago
- Command and Control Framework using powershell implants☆35Updated 3 weeks ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆27Updated 3 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆21Updated 11 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆28Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Tools for offensive security of NetBackup infrastructures☆41Updated 2 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- Leverages B64 chunks to split files and save to clipboard☆26Updated 2 months ago
- Windows Event Log Auditor☆30Updated this week
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- single-threaded event driven sleep obfuscation poc for linux☆34Updated last month
- ☆22Updated last year
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- self-hosted Azure OSINT tool☆31Updated 2 weeks ago