Immediate Virus Infection Counter Measures
☆63Apr 13, 2021Updated 5 years ago
Alternatives and similar repositories for Rewind
Users that are interested in Rewind are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 22, 2020Updated 5 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- Extensible MacOS system telemetry generator.☆56Apr 12, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 6 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- A Crude C2 to Demonstrate Using QR Codes for Channel Traffic☆39Sep 21, 2020Updated 5 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Leetcode solutions☆15Dec 24, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆38Dec 12, 2022Updated 3 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 5 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- Evaluating and Reporting on Azure Active Directory/Active Directory Users Security Posture☆29May 8, 2019Updated 7 years ago
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- Fingerprint reader (CS9711) Framework expansion card☆44Updated this week
- Script to automate setting base level MS Secure score in Office 365☆19Jul 31, 2020Updated 5 years ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆225May 1, 2021Updated 5 years ago
- THOR Thunderstorm Collectors☆27Apr 27, 2026Updated last week
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆38Jan 18, 2022Updated 4 years ago
- ☆39Feb 12, 2020Updated 6 years ago
- Shared libraries for other projects☆22Apr 29, 2026Updated last week
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆15Jan 24, 2016Updated 10 years ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- A collection of Neo4j/BloodHound queries to collect interesting information.☆47May 9, 2022Updated 3 years ago
- ☆22Mar 14, 2024Updated 2 years ago
- Reads and prints information from the website MalAPI.io☆21Jul 14, 2022Updated 3 years ago
- Surgical python tool to assist in LFI discovery☆13Sep 2, 2018Updated 7 years ago