ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incident response. Built with Python and scikit-learn.
☆60Feb 7, 2026Updated 3 weeks ago
Alternatives and similar repositories for ExeRay
Users that are interested in ExeRay are comparing it to the libraries listed below
Sorting:
- Automation of some MAPT activities and interaction with the mobile Android device.☆22Sep 28, 2025Updated 5 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 5 months ago
- ☆14Nov 8, 2024Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 10 months ago
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- ☆13Oct 24, 2024Updated last year
- ☆14Jun 12, 2025Updated 8 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 3 months ago
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 4 years ago
- ☆19Nov 28, 2024Updated last year
- A Python-based backdoor and server communication tool for ethical hacking and reverse shell practice using socket programming.☆28May 21, 2025Updated 9 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 10 months ago
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22May 14, 2025Updated 9 months ago
- ☆17Sep 17, 2025Updated 5 months ago
- A hacky way of getting cross-arch/platform support in Cobalt Strike☆37Aug 31, 2025Updated 6 months ago
- Upload one or multiple sources (including .pdf files) and chat with the contents of the documents using OpenAI models☆22Oct 8, 2024Updated last year
- VirtualBox Web Control Panel is a lightweight HTTP server script providing a simple web interface to list, control, and interact with Vir…☆25Apr 15, 2025Updated 10 months ago
- ☆21Dec 16, 2024Updated last year
- Webripper Pro is a comprehensive, professional-grade web vulnerability scanner that automates the detection of security flaws in websites…☆37Jul 4, 2025Updated 7 months ago
- Data anonymization & masking of sensitive information in a relational database. Auto detection of sensitive data.☆29Nov 14, 2024Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- Bot to Spam messages on YouTube Live Stream Chat with an integrated MCP Server and a Realtime Dashboard☆22Feb 22, 2026Updated last week
- A CLI tool that bundles source code files into a single context for LLM prompts☆21Jan 9, 2025Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 7 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆30Nov 24, 2025Updated 3 months ago
- Payload encoding utility to effectively lower payload entropy.☆124Apr 15, 2025Updated 10 months ago
- IPSpot: Retrieve IPv4/IPv6 Addresses with Geolocation Data☆101Feb 15, 2026Updated 2 weeks ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- ☆28Sep 9, 2024Updated last year
- Proof-of-concept implementation of AI-enabled postex DLLs☆54Sep 10, 2025Updated 5 months ago
- ☆27Oct 27, 2025Updated 4 months ago
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- TypeLib persistence technique☆140Oct 22, 2024Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year