Malware management program and tools
☆27Dec 16, 2015Updated 10 years ago
Alternatives and similar repositories for VxVault
Users that are interested in VxVault are comparing it to the libraries listed below
Sorting:
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- ☆17Nov 12, 2019Updated 6 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆47Jul 21, 2020Updated 5 years ago
- Dexaran's Naming Service☆20Mar 22, 2023Updated 2 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- Current development for Call Map takes place at https://github.com/ajylee/call_map. Call Map is a tool for navigating Python call graphs.…☆29Jul 31, 2021Updated 4 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Jul 5, 2016Updated 9 years ago
- Database of Internet Facing TN3270 Mainframes☆23Jul 31, 2015Updated 10 years ago
- https://blog.xpnsec.com/windows-warbird-privesc/☆31Nov 27, 2017Updated 8 years ago
- Same code , different CPU case , different build case , Iot bins reverse learning.☆28Mar 8, 2017Updated 8 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Windows Runtime API Interop Utilities for Windows PowerShell☆30Jan 10, 2020Updated 6 years ago
- Open Source Rootkit☆22Jul 28, 2017Updated 8 years ago
- AWS S3 Bucket/Object Finder☆25Nov 11, 2017Updated 8 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Mar 13, 2017Updated 8 years ago
- Openssh backdoor found with a ssh honeypot☆27Jul 22, 2016Updated 9 years ago