Lifka / thor-av-multiscannerLinks
Open source tool for static analysis of malwares.
☆29Updated 5 years ago
Alternatives and similar repositories for thor-av-multiscanner
Users that are interested in thor-av-multiscanner are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆25Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- powershell tool for VM evasion☆42Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- Host IDS for desktop users☆12Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- ☆17Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- ☆53Updated 4 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 4 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆12Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆22Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago