Lifka / thor-av-multiscannerView external linksLinks
Open source tool for static analysis of malwares.
☆28Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for thor-av-multiscanner
Users that are interested in thor-av-multiscanner are comparing it to the libraries listed below
Sorting:
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- This is the official repository for the back end of Mobilinux App.☆20Oct 1, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- Hacking ZXHN H108N Router (brute-force)☆12Mar 21, 2019Updated 6 years ago
- ☆11Feb 14, 2025Updated last year
- ☆12Jul 8, 2020Updated 5 years ago
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆17Feb 23, 2021Updated 4 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆40Oct 26, 2020Updated 5 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Dec 9, 2024Updated last year
- 🔥 Pentest Cheat Sheet☆36Aug 10, 2021Updated 4 years ago
- Hacking, pen-testing, and cyber-security related tools built with Python.☆36Nov 20, 2020Updated 5 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Nov 12, 2021Updated 4 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 4 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆19Updated this week
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- ☆23May 23, 2024Updated last year
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆28Mar 7, 2019Updated 6 years ago
- ADDS (Active Directory Domain Services)☆28Feb 3, 2026Updated last week
- A Python based Web Application security scanner☆25Nov 26, 2020Updated 5 years ago
- cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50☆25Jan 23, 2023Updated 3 years ago
- A tool that automates the process of enumeration☆30Oct 27, 2020Updated 5 years ago
- Yet another web recon tool☆61Aug 9, 2023Updated 2 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- A versatile hacking framework that consolidates tools for OSINT, penetration testing, networking, auditing, and more, providing a compre…☆62May 31, 2023Updated 2 years ago
- Simple API Hooks detector☆77Aug 22, 2022Updated 3 years ago
- Passive subdomain enumeration tool with http-probe.☆32Apr 30, 2021Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- .NET 4.0 Remote Desktop Manager Password Gatherer☆81Sep 29, 2020Updated 5 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- A rewrite of mactime, a bodyfile reader☆39Aug 5, 2024Updated last year