Detect silent (unwanted) changes to files on your system
☆162May 4, 2020Updated 5 years ago
Alternatives and similar repositories for binsnitch
Users that are interested in binsnitch are comparing it to the libraries listed below
Sorting:
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153May 4, 2017Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- Teaching old shellcode new tricks☆209Aug 1, 2017Updated 8 years ago
- ☆166Apr 25, 2017Updated 8 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆231Jan 18, 2024Updated 2 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- rVMI - A New Paradigm For Full System Analysis☆359Oct 4, 2017Updated 8 years ago
- 📡 A python program to create a fake AP and sniff data.☆1,691Nov 3, 2019Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- online port scan scraper☆1,120Aug 7, 2023Updated 2 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- A collection of code snippets used in blog posts.☆53Aug 29, 2025Updated 6 months ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆243Sep 13, 2021Updated 4 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Oct 22, 2016Updated 9 years ago
- Collection of metasploit modules☆69Mar 1, 2017Updated 9 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Public repository for improvements to the EXTRABACON exploit☆163Nov 2, 2016Updated 9 years ago
- Tools for auditing WAFS☆464Nov 24, 2020Updated 5 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- The first open source vulnerability scanner for firmwares☆197Jul 18, 2016Updated 9 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,213Feb 6, 2022Updated 4 years ago
- Modern tactical exploitation toolkit.☆859Nov 8, 2025Updated 3 months ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- Liniaal - A communication extension to Ruler☆99Aug 22, 2018Updated 7 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago