OPSWAT / metadefender-browser-extensionLinks
browser extension for scanning with MetaDefender
☆18Updated 2 months ago
Alternatives and similar repositories for metadefender-browser-extension
Users that are interested in metadefender-browser-extension are comparing it to the libraries listed below
Sorting:
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- [ARCHIVED] Please report to https://github.com/funilrys/PyFunceble.☆30Updated 7 years ago
- This is the home of the CoinBlockerLists homepage.☆16Updated 6 years ago
- A report on the reputation of some of the worst network hosts for Network Abuse, Malware, DDoS etc.☆9Updated last year
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Maltego integration of https://clearbit.com☆38Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆26Updated 7 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 11 months ago
- Public Github Pages for Cisco☆14Updated 6 years ago
- Casper is a tiny system tray application that can be used to view the invisible windows on your desktop.☆12Updated 8 years ago
- Drag and drop a hosts file to convert it.☆13Updated 4 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Malware, spam, and phishing indicators of compromise that involve the use of COVID-19 or coronavirus in some way☆32Updated 4 years ago
- Bash Tutorials to accompany YouTube series☆8Updated 8 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆39Updated 9 years ago
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Updated 5 years ago
- automatically check all downloads against 68 anti-virus solutions (through VirusTotal API)☆19Updated 3 years ago
- Technical Notes☆16Updated 7 years ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- The pattern matching swiss knife☆15Updated 5 years ago
- Dump Windows registry hives as text.☆16Updated 6 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- Metasploit modules, powershell scripts and custom exploit to perform local privilege escalation on windows systems.☆11Updated 8 years ago