Orange-OpenSource / decret
DEbian Cve REproducer Tool
☆24Updated last year
Alternatives and similar repositories for decret:
Users that are interested in decret are comparing it to the libraries listed below
- ☆55Updated 6 months ago
- Tools for offensive security of NetBackup infrastructures☆40Updated last year
- Detect and remove the presence of canary tokens☆20Updated last year
- Linux #rootkit and #malware revealer☆24Updated 9 months ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Recreation of most of the Raccoon Infostealer's functionality, true to threat intelligence, for safe testing in organizational environmen…☆17Updated last year
- ☆29Updated 3 weeks ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆33Updated last week
- ☆47Updated 10 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- Qemuno Framework☆24Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- ☆17Updated 8 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- ☆114Updated last year
- The core backend server handling API requests and task management☆39Updated 2 weeks ago
- All kinds of tiny shells☆58Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 6 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆34Updated 9 months ago
- A VS Code extension to preview XML nmap output☆44Updated 2 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- ☆15Updated 3 months ago
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆22Updated 6 months ago
- self-hosted Azure OSINT tool☆30Updated 8 months ago
- eBPF Memory Dump Tool☆64Updated 2 months ago
- Rebuild of portspoof in GO with additional features.☆17Updated 3 weeks ago
- urlyzer is a URL parsing analysis tool.☆22Updated 9 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago