Immediate Virus Infection Counter Measures
☆63Apr 13, 2021Updated 5 years ago
Alternatives and similar repositories for Rewind
Users that are interested in Rewind are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Dec 22, 2020Updated 5 years ago
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Feb 11, 2021Updated 5 years ago
- PE File Blessing - To continue or not to continue☆87Nov 23, 2019Updated 6 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Extensible MacOS system telemetry generator.☆56Updated this week
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- A Crude C2 to Demonstrate Using QR Codes for Channel Traffic☆39Sep 21, 2020Updated 5 years ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Export disassemblies into Protocol Buffers☆21Jul 18, 2025Updated 9 months ago
- Secure random passwords in Javascript☆14Apr 21, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Leetcode solutions☆15Dec 24, 2025Updated 3 months ago
- Incident Response Network Tools☆24Jul 23, 2021Updated 4 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 5 years ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Evaluating and Reporting on Azure Active Directory/Active Directory Users Security Posture☆29May 8, 2019Updated 6 years ago
- Fingerprint reader (CS9711) Framework expansion card☆43Oct 15, 2025Updated 6 months ago
- This tool enables the compilation of a C# program that will execute arbitrary PowerShell code, without launching PowerShell processes thr…☆196Jul 26, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆224May 1, 2021Updated 4 years ago
- THOR Thunderstorm Collectors☆26Apr 8, 2026Updated last week
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- [+] nls_933w.dll + [+] WIN32M.SYS MALWARE- ONLY FOR ACADEMICAL RESEARCH PURPOSES!