Miscellaneous analysis tools
☆25Mar 3, 2015Updated 11 years ago
Alternatives and similar repositories for analysis-tools
Users that are interested in analysis-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanner for document roots/URLs.☆14Nov 17, 2011Updated 14 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- An OS X analyzer for Cuckoo Sandbox project☆57Sep 1, 2015Updated 10 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- Remote execution tool☆14Jan 14, 2014Updated 12 years ago
- A shell / chat bot for XMPP and cloud services☆48Oct 10, 2015Updated 10 years ago
- Resources for DFIR. And more.☆11Jul 3, 2024Updated last year
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Scoreboard for CTF Competitions☆27Jul 19, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Reverse HTTP shell with basic ARC4 encryption support☆12Dec 28, 2015Updated 10 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Jun 7, 2014Updated 11 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆56Jul 20, 2017Updated 8 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- Are your installed packages _really_ the same as you saw on GitHub?☆24Jun 1, 2018Updated 7 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Oct 10, 2015Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- MiTM tools and scripts☆19Aug 28, 2015Updated 10 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆172Jun 11, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Perform WiFi scans from python in OSX. Simply import this module and run wifi_scan()☆18Feb 27, 2016Updated 10 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆83May 9, 2014Updated 11 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago