Lifka / thor-av-multiscanner
Open source tool for static analysis of malwares.
☆27Updated 4 years ago
Alternatives and similar repositories for thor-av-multiscanner:
Users that are interested in thor-av-multiscanner are comparing it to the libraries listed below
- Custom pentesting tools☆24Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- ☆16Updated 5 years ago
- Files for generating a C# source file that allows for memory-mapping "niceness" and then executing said "niceness"☆31Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- My Malware Analysis Reports☆19Updated 2 years ago
- Host IDS for desktop users☆11Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆27Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago
- ☆12Updated 4 years ago
- Retrieve the IIS Application Pool Credentials. Relies on the WebAdministration PowerShell Module.☆14Updated 7 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 2 years ago
- Miscellaneous PowerShell scripts for red team activities☆16Updated 3 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- ProcDot Malware Sandbox☆22Updated 3 months ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆13Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 4 years ago