MalWerewolf / vtlookupView external linksLinks
Virus Total Lookup Script
☆14Aug 18, 2015Updated 10 years ago
Alternatives and similar repositories for vtlookup
Users that are interested in vtlookup are comparing it to the libraries listed below
Sorting:
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Aug 4, 2014Updated 11 years ago
- Data Driven Threat Hunting on the RaspberryPi☆31Jan 26, 2022Updated 4 years ago
- Defence Against the Dark Arts☆34Sep 15, 2019Updated 6 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- ☆12Oct 1, 2020Updated 5 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- Ruins & Riches Ultima Online Server Files☆10Oct 15, 2023Updated 2 years ago
- Examples of various Ansible Playbooks for Microsoft Windows Server 2016☆10Mar 3, 2019Updated 6 years ago
- CyberArk Credentials Provider (CCP) Plugin for HashiCorp Vault☆17Jan 12, 2024Updated 2 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- ☆10Jan 25, 2024Updated 2 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- ☆10Oct 8, 2015Updated 10 years ago
- This project attempts to classify the entries in the Microsoft Malware Classification Challenge dataset using random forests.☆11Dec 22, 2016Updated 9 years ago
- Create a new Windows VM on a standalone ESX host☆12Jan 1, 2021Updated 5 years ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- proxy server for Ecoforest stoves☆10Nov 22, 2021Updated 4 years ago
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Jun 14, 2023Updated 2 years ago
- ☆32Jul 7, 2015Updated 10 years ago
- CRC Tool Kit☆18Oct 5, 2012Updated 13 years ago
- Shellyzer Gui is a simple desktop application that helps you analyze shellcode (disassemble shellcode) in well view and i will add many f…☆12Jun 23, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Python bindings for AsmJit☆12Aug 13, 2012Updated 13 years ago
- Allows a user to grab documentation from online MSDN for a given function name in IDA, and import the documentation as a repeatable comme…☆15Jul 22, 2012Updated 13 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- ViewState encoder/decoder Fiddler Plugin☆11Jul 9, 2009Updated 16 years ago