NomanProdhan / malbuzzLinks
It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all other samples using YARA rules, CalmAV signatures, etc. This tool is based on MalwareBazaar.
☆20Updated 6 months ago
Alternatives and similar repositories for malbuzz
Users that are interested in malbuzz are comparing it to the libraries listed below
Sorting:
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated 4 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- ☆35Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated last year
- Cobalt Strike BOFS☆16Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- ☆27Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- A Red Teaming tool focused on profiling the target.☆29Updated 3 weeks ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Updated 7 months ago
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago