OPSWAT / metadefender-browser-extensionLinks
browser extension for scanning with MetaDefender
☆20Updated 10 months ago
Alternatives and similar repositories for metadefender-browser-extension
Users that are interested in metadefender-browser-extension are comparing it to the libraries listed below
Sorting:
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 12 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆37Updated last year
- Collection of single use scripts I worte for windows forensics☆27Updated 14 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 6 years ago
- ☆54Updated last week
- Scapytain is a web application that enables you to store, organise and run test campaigns on top of Scapy.☆19Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆26Updated 8 years ago
- Tool useful to discover services behind unknown ports☆14Updated 4 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 10 years ago
- Maltego integration of https://clearbit.com☆41Updated 5 years ago
- apbleed☆24Updated 11 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Dragon Sandbox☆79Updated 12 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago
- A GUI-based tool to perform security testing against the HDMI CEC (Consumer Electronics Control) and HEC (HDMI Ethernet Channel) protocol…☆31Updated 12 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- A curated list of tools for incident response☆34Updated last year
- A curated list of awesome malware analysis tools and resources☆16Updated 7 years ago
- Hasher is designed to be a tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. Not…☆52Updated 4 years ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- ToolsWatch and Black Hat Arsenal selection of badges☆58Updated last year
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆42Updated 2 weeks ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- For collecting probed SSID name by wireless devices, Access point detail and connected clients.☆37Updated 11 years ago