MohamedMostafa010 / ExeRayLinks
ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incident response. Built with Python and scikit-learn.
☆59Updated 4 months ago
Alternatives and similar repositories for ExeRay
Users that are interested in ExeRay are comparing it to the libraries listed below
Sorting:
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆186Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆104Updated 2 months ago
- Repository contains a collection of scripts designed to demonstrate and exploit various vulnerabilities in HTTP and related protocols☆29Updated last month
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆143Updated 11 months ago
- Payload for jpg file☆64Updated last year
- A comprehensive Python-based security tool for file scanning, malware detection, and analysis in an ever-evolving cyber landscape.☆111Updated 2 years ago
- File Hider is a sophisticated tool that allows you to securely hide and encrypt a file within another file using multiple layers of AES-2…☆142Updated last year
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Updated last year
- All in 1 phishing framework☆37Updated 3 years ago
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆104Updated last year
- Cisco IOS Security Inspector☆40Updated last week
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆67Updated 5 months ago
- ☆31Updated this week
- Modern web-based distributed hashcracking solution, built on hashcat☆189Updated this week
- ☆20Updated 3 months ago
- Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.☆275Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆62Updated 2 weeks ago
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆118Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- Friendly graphical output of the nmap tool that allows filtering by open ports☆186Updated 3 years ago
- Our Tips&Tricks☆128Updated 10 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- Finding secrets in various (non-text) popular files.☆51Updated 2 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Updated 5 months ago
- Privileger is a tool to work with Windows Privileges☆139Updated 2 years ago
- GitHub CVE Repository Hunt☆19Updated last year
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 3 months ago