Whitecat18 / vxug-scraperLinks
☆51Updated 6 months ago
Alternatives and similar repositories for vxug-scraper
Users that are interested in vxug-scraper are comparing it to the libraries listed below
Sorting:
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 9 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Updated 11 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆125Updated last year
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 9 months ago
- A repository of credential stealer formats☆243Updated 8 months ago
- Lockbit, URSIF, BlackBasta etc.☆222Updated 3 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- ☆72Updated last year
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆207Updated this week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Updated 6 months ago
- ☆164Updated 11 months ago
- Passive leak enumeration tool.☆266Updated this week
- An archive of 0day.today exploits☆341Updated 6 months ago
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆157Updated 6 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- ☆50Updated 11 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆83Updated 2 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 3 months ago
- collection of blogs about malware development and analysis☆64Updated 2 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆111Updated 2 months ago
- Embed a payload inside a PNG file☆368Updated last year
- A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachFor…☆149Updated this week
- ☆45Updated last year
- This is practice VM for malware development☆179Updated 2 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆366Updated 5 months ago
- Cheat sheet to detect and remove linux kernel rootkit☆78Updated last year