Vatshayan / Malware-Scanner-SystemLinks
Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat identification. Project Code, Documents and Video Implementation
☆13Updated 8 months ago
Alternatives and similar repositories for Malware-Scanner-System
Users that are interested in Malware-Scanner-System are comparing it to the libraries listed below
Sorting:
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Updated 8 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Updated 10 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆85Updated 2 weeks ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 9 months ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆43Updated this week
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- ☆35Updated 2 years ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 8 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- ☆59Updated last month
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆46Updated 7 months ago
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆97Updated last month
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 11 months ago
- This python script performs a number of sqlite queries (mainly password metadata) against sqlite databases (Created by ROADtools) to prov…☆22Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 11 months ago
- ☆23Updated last year
- ☆20Updated 3 weeks ago
- ☆96Updated 6 months ago
- Exploit for CVE-2024-5009☆13Updated last year
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- Docker container for running CobaltStrike 4.10☆38Updated last year
- ☆55Updated 2 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Updated last year
- PowerShell script to generate ShellCode in various formats☆46Updated last year
- ☆41Updated 2 years ago