IDS/IPS malware download evasion
☆15Feb 21, 2019Updated 7 years ago
Alternatives and similar repositories for evador
Users that are interested in evador are comparing it to the libraries listed below
Sorting:
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- Leak windows system info through a docx file☆12Feb 23, 2020Updated 6 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24May 18, 2019Updated 6 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- ☆30Jul 11, 2018Updated 7 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Oct 23, 2015Updated 10 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Shim database persistence (Fin7 TTP)☆37Feb 25, 2020Updated 6 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- BattlEye Emulator, modified from slicktors work.☆14Nov 27, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- A Nagios plugin to monitor build time of Jenkins jobs☆15Jun 24, 2020Updated 5 years ago
- Getting started with OpenTelemetry☆16Nov 9, 2022Updated 3 years ago
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- Utils for Cryptography class (1047622)☆14Nov 13, 2025Updated 3 months ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- PowerShell Module for Infoblox☆12Jun 28, 2015Updated 10 years ago
- Testing Github actions with Pandoc☆10Dec 1, 2023Updated 2 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- ☆12Jul 7, 2014Updated 11 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Python Keylogger PortScanner BruteForce and basic hack tools.(new ones will come soon)☆18Mar 30, 2021Updated 4 years ago
- Flask-Rebar Authenticator for Auth0☆13Jan 13, 2023Updated 3 years ago
- ☆11Nov 29, 2018Updated 7 years ago
- Bill of Materials and all parts for Ultimaker Original Heated Bed Upgrade☆12Sep 7, 2021Updated 4 years ago
- Tool for managing MySQL migrations with python☆10Aug 12, 2023Updated 2 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Aug 5, 2022Updated 3 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- LinkedinScraper is an another information gathering tool written in python. You can scrape employees of companies on Linkedin.com and the…☆37Jul 27, 2020Updated 5 years ago