Lifka / thor-av-multiscanner
Open source tool for static analysis of malwares.
☆28Updated 4 years ago
Alternatives and similar repositories for thor-av-multiscanner
Users that are interested in thor-av-multiscanner are comparing it to the libraries listed below
Sorting:
- Custom pentesting tools☆25Updated 4 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- ☆12Updated 4 years ago
- ProcDot Malware Sandbox☆24Updated 5 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 2 years ago
- Host IDS for desktop users☆11Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆36Updated last year
- Just another useless C2 occupying space in some HDD somewhere.☆20Updated last year
- Automated Payload Test Controller☆10Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 5 years ago
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆24Updated 2 years ago
- ☆14Updated last year
- ☆17Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆12Updated 4 years ago