Malware detonation platform Polygon integration
☆10Aug 1, 2023Updated 2 years ago
Alternatives and similar repositories for pythf
Users that are interested in pythf are comparing it to the libraries listed below
Sorting:
- Command-line tool to identify useragents that bypasses proxy restrictions☆11Oct 23, 2025Updated 4 months ago
- ☆10Dec 30, 2020Updated 5 years ago
- CRUD con archivos en PHP y MySQL☆11Aug 22, 2023Updated 2 years ago
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Dec 8, 2025Updated 2 months ago
- Best Tool for Increase Instagram Follower. ( recoding of insfollow to bypass the ban)☆10Nov 11, 2022Updated 3 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆20Nov 23, 2025Updated 3 months ago
- This tool is a simple ffuf launcher which lets you select dynamically which wordlist and which extentions you want to fuzz.☆10Sep 10, 2025Updated 5 months ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Rapid Response sample Foundry app☆17Updated this week
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Gojira is a record and replay framework for Java apps meant for regression testing. It provides complete recording capability within a si…☆13Feb 5, 2025Updated last year
- https://breaking-bits.gitbook.io/breaking-bits/exploit-development/linux-kernel-exploit-development☆44Jan 15, 2022Updated 4 years ago
- Action-Driven Asset Orchestrator Suite with Distributed architecture featuring Dynamic Content Management capabilities implementing moder…☆16Oct 1, 2025Updated 4 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- PTF-based data plane tests for ONOS fabric.p4☆15Aug 6, 2021Updated 4 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last month
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- In this project, I use OpenAI and the DALL-E model to create a web app that generates images from scratch based on the entered text.☆10Dec 12, 2022Updated 3 years ago
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 9 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- Udev helper for naming devices per BIOS names☆19Sep 21, 2023Updated 2 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago
- qemu-system by docker-compose☆13Jun 14, 2022Updated 3 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆10Jan 2, 2016Updated 10 years ago