Typodetect
☆75Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for typodetect
Users that are interested in typodetect are comparing it to the libraries listed below
Sorting:
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Arkhota, a web brute forcer for Android.☆19Feb 15, 2023Updated 3 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Aug 6, 2021Updated 4 years ago
- Bucky (An automatic S3 bucket discovery tool)☆198Jan 6, 2022Updated 4 years ago
- Feed Generator for MISP☆19Nov 2, 2022Updated 3 years ago
- Awesome Hacking☆20Nov 9, 2018Updated 7 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- ☆21Aug 26, 2021Updated 4 years ago
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- C# port of WMImplant which uses either CIM or WMI to query remote systems☆203Jul 14, 2021Updated 4 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆162Jul 11, 2021Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆80Jul 29, 2022Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Dec 8, 2022Updated 3 years ago
- Event Trace Log file parser in pure Python☆150Nov 27, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- A stealthy, fast and easy tool to spray Active Directory credentials and bypass AD credential spraying controls.☆13Oct 13, 2022Updated 3 years ago
- ☆44Aug 3, 2021Updated 4 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- Helper plugin for analyzing UEFI firmware☆89Jun 3, 2024Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- ☆19Mar 2, 2022Updated 4 years ago
- A .NET implementation to dump SAM / SECURITY / SYSTEM registry hives☆56Sep 25, 2020Updated 5 years ago
- ☆16Jan 5, 2021Updated 5 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆27Jan 5, 2021Updated 5 years ago