Vatshayan / Malware-Scanner-SystemLinks
Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat identification. Project Code, Documents and Video Implementation
☆13Updated 7 months ago
Alternatives and similar repositories for Malware-Scanner-System
Users that are interested in Malware-Scanner-System are comparing it to the libraries listed below
Sorting:
- Top 400 passwords as per HaveIBeenPwned☆22Updated last year
- ☆20Updated 2 months ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Updated 7 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆37Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- ☆13Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- ☆59Updated last month
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Updated last month
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ☆35Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated last year
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆27Updated last month
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆46Updated 6 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆95Updated 9 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- ☆56Updated last month
- ECC Public Key Cryptography☆37Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆26Updated last year
- exfiltration/infiltration toolkit☆23Updated 2 years ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆91Updated this week
- A powerful Windows command-line tool for analyzing and searching ETW (Event Tracing for Windows) provider permissions from the Windows re…☆61Updated 5 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆12Updated 8 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆63Updated last year
- Source code and examples for PassiveAggression☆64Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 10 months ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- SpicyAD is a C# Active Directory penetration testing tool designed for authorized security assessments. It combines multiple AD attack te…☆94Updated 2 weeks ago