MarioVilas / vuln_tools
Tools to work with vulnerability standards.
☆19Updated 10 years ago
Alternatives and similar repositories for vuln_tools:
Users that are interested in vuln_tools are comparing it to the libraries listed below
- Here comes the paintrain!☆11Updated 8 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Updated 11 years ago
- See here:☆42Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- recon framework in ruby☆13Updated 13 years ago
- Collect hashes password hashes for cracking☆31Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆13Updated 7 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆14Updated 9 years ago
- Network Forensics Workshop Files☆17Updated 9 years ago
- ☆16Updated 10 years ago
- r2yara - Module for Yara using radare2 information☆34Updated last year
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- A tool to generate yara signatures from function blocks☆19Updated 10 years ago