Automatically deploy a Cuckoo sandbox
☆23Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for AutoDeployCuckoo
Users that are interested in AutoDeployCuckoo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆10May 15, 2020Updated 5 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- Some useful FRIDA scripts for security tests☆44Feb 22, 2023Updated 3 years ago
- ☆13Jan 25, 2020Updated 6 years ago
- Massive Vulnerability scanner☆12Mar 20, 2022Updated 4 years ago
- Python3 Module to interact with the SonicWall® SonicOS API☆14Jan 6, 2025Updated last year
- Nextcloud / Owncloud CLI Webdav Client☆10Nov 20, 2022Updated 3 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- POC for RCE vulnerability in ParseExcel library, and ParseXLSX too, as a depending library☆18Sep 20, 2024Updated last year
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 4 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- ☆34Mar 29, 2021Updated 4 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- A Python wrapper library for libyara and a local server for fully utilizing the CPUs of the system to scan with yara...with additional ca…☆19Dec 8, 2022Updated 3 years ago
- ☆18Oct 20, 2021Updated 4 years ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- Mock malware to show the process of how a polymorphic virus takes control over directories while encrypting, locking files, and injects i…☆12Dec 27, 2018Updated 7 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- Buy Book Online Project uses MVC2 Design Pattern☆17Oct 8, 2022Updated 3 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆20Jan 5, 2023Updated 3 years ago
- Hands-On Penetration Testing on Windows, published by Packt☆27Jan 18, 2023Updated 3 years ago
- Sniff xsi-events from/to XSI-Events in Broadsoft BW☆10Jun 18, 2014Updated 11 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 10 months ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- A Patchless AMSI Bypass Technique using VEH²☆31Jun 22, 2025Updated 9 months ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Feb 16, 2014Updated 12 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 4 months ago
- Realtime chat example using Sails 1.0☆10Jul 10, 2017Updated 8 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆22Apr 19, 2022Updated 3 years ago
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- This is an example script that leverages pyATS to lookup the switch interfaces where MAC Addresses are located.☆12Jan 4, 2021Updated 5 years ago
- Django project to manage a Recalbox from a web interface☆13Sep 11, 2017Updated 8 years ago
- BetterBugBounty - Here tools are classic, bugs are hunted, and nostalgia is the ultimate weapon!☆29Feb 10, 2024Updated 2 years ago
- ☆18Mar 26, 2022Updated 3 years ago
- ☆14Feb 7, 2024Updated 2 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago