Lifka / thor-av-multiscannerLinks
Open source tool for static analysis of malwares.
☆29Updated 5 years ago
Alternatives and similar repositories for thor-av-multiscanner
Users that are interested in thor-av-multiscanner are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆25Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆82Updated last year
- ProcDot Malware Sandbox☆24Updated last month
- Sp00fer blog post -☆25Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Simple C2 over the Trello API☆39Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- ☆24Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- ☆19Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆21Updated 4 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 6 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 5 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- ☆16Updated 4 years ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago