MohamedMostafa010 / ExeRayLinks
ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incident response. Built with Python and scikit-learn.
☆48Updated this week
Alternatives and similar repositories for ExeRay
Users that are interested in ExeRay are comparing it to the libraries listed below
Sorting:
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆151Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆97Updated 2 months ago
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆109Updated last year
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆135Updated 6 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆94Updated 10 months ago
- Cisco IOS Security Inspector☆34Updated 4 months ago
- Modern web-based distributed hashcracking solution, built on hashcat☆143Updated this week
- Privileger is a tool to work with Windows Privileges☆136Updated 2 years ago
- ☆22Updated this week
- Payload for jpg file☆65Updated 11 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆48Updated 2 weeks ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆97Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 11 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 11 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆195Updated 5 months ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆117Updated 2 months ago
- PowerShell script to generate ShellCode in various formats☆42Updated 10 months ago
- GitHub CVE Repository Hunt☆18Updated last year
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆134Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 4 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆273Updated last year
- Our Tips&Tricks☆124Updated 5 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆117Updated 3 months ago
- A Rust implementation of GodPotato — abusing SeImpersonate to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTA…☆302Updated 3 months ago
- LSTAR - CobaltStrike Translated to EN☆21Updated 2 years ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated 8 months ago
- Analyse MSI files for vulnerabilities☆137Updated 11 months ago
- Reverse Shell - technique is commonly used in cyber attacks☆16Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆91Updated 4 months ago