NomanProdhan / malbuzzLinks
It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all other samples using YARA rules, CalmAV signatures, etc. This tool is based on MalwareBazaar.
☆20Updated 2 months ago
Alternatives and similar repositories for malbuzz
Users that are interested in malbuzz are comparing it to the libraries listed below
Sorting:
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- ☆35Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Cobalt Strike BOFS☆16Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 11 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆27Updated 3 months ago
- ☆25Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- ☆28Updated 2 years ago
- ECC Public Key Cryptography☆39Updated last year
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Modular framework to exploit UPS devices☆65Updated 2 years ago