☆11Oct 28, 2016Updated 9 years ago
Alternatives and similar repositories for Malware-Analysis
Users that are interested in Malware-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- ☆11Feb 14, 2025Updated last year
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- Placeholder for IRIS-H Digital Forensics Tool☆15May 30, 2018Updated 7 years ago
- Various scripts to help you out. Mostly very scrappy, but functional. I realise Write-Host is not the way to do things, but I wrote som…☆27May 13, 2022Updated 3 years ago
- Check Arbitrary File Download the CMS Wordpress☆14Nov 19, 2015Updated 10 years ago
- ☆15Jun 29, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This Repository is specially created for the NL InfoSec Discord Channel☆12Dec 19, 2021Updated 4 years ago
- My BookMark☆18Jan 5, 2020Updated 6 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Example Python and R code for Cloudera Machine Learning (CML) training☆14Dec 1, 2020Updated 5 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 9 years ago
- Explains how to setup a omnibus full gitlab-ce (git, registry, pages) with HTTPS and Let's Encrypt certificates☆10Jan 4, 2022Updated 4 years ago
- 🛡 Check Windows and Control Configs and Security - CWiCCS (read as QUICKS)☆13Jan 14, 2023Updated 3 years ago
- A python wrapper of vmrun.exe, which is used to control Vmware. Its idea is based on Alexander Sotirov's vmrun-ruby. Currently it only su…☆17Mar 23, 2021Updated 5 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Source code for 'Beginning C' by Ivor Horton☆13Mar 29, 2017Updated 9 years ago
- ☆20May 5, 2024Updated last year
- 一个用来xss劫持会话利用的chrome插件☆13Sep 3, 2014Updated 11 years ago
- Produces a suitable .gitlab-ci.yml file from a Golang TXT Template to work as input for a parent/child triggered GitLab CICD pipeline.☆11Mar 30, 2026Updated last week
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Mirror of the OpenDaylight usc gerrit project☆12Sep 21, 2020Updated 5 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Terraform module for Cloudera Manager☆11May 6, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆21Updated this week
- tools, files, and scripts I use for PNPT and CRTO☆24Feb 21, 2022Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- VSTS Pipeline demonstrating Terraform and Ansible☆11May 28, 2018Updated 7 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- A repository that maps API calls to Sysmon Event ID's.☆121Nov 14, 2022Updated 3 years ago
- Automate Cisco LAN Switching Configuration using Ansible☆13Sep 4, 2020Updated 5 years ago