The Pentester's Swiss Army Knife
☆26Jan 25, 2020Updated 6 years ago
Alternatives and similar repositories for psak
Users that are interested in psak are comparing it to the libraries listed below
Sorting:
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- Command and Control server on Slack☆29Jan 30, 2019Updated 7 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- PHP Site vulnerable to basic XSS/SQL Injection☆27Jul 14, 2021Updated 4 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- ☆24Nov 11, 2025Updated 3 months ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Rekall is an endpoint security solution.☆38Feb 12, 2018Updated 8 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Jul 8, 2019Updated 6 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A lightweight 3D rendering engine 100% written in Java (no hardware dependency) and providing a java API to build world geometry, define …☆14Feb 15, 2026Updated 2 weeks ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- Fastlane plugin to run XCUI Test in the parallel using Bluepill☆10Oct 28, 2019Updated 6 years ago
- Tired of trying to find and test all edge cases in your methods or APIs? BreakIt tries solve this problem by automatically going through …☆11Aug 6, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- React UI☆11Jan 4, 2023Updated 3 years ago
- ☆13Jul 14, 2020Updated 5 years ago