YuB-W / Domain-ExecutorLinks
Domain Executor is basically an engine for Roblox games scripts. This heavy-duty tool makes the challenging process of executing Roblox scripts faster and more accurate.
☆21Updated last year
Alternatives and similar repositories for Domain-Executor
Users that are interested in Domain-Executor are comparing it to the libraries listed below
Sorting:
- The pattern matching swiss knife☆9,306Updated last month
- Repository of yara rules☆4,632Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,876Updated 3 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,105Updated 9 months ago
- An advanced memory forensics framework☆7,924Updated 7 months ago
- Loki - Simple IOC and YARA Scanner☆3,697Updated 2 months ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,062Updated this week
- YARA signature and IOC database for my scanners and tools☆2,823Updated last week
- Volatility 3.0 development☆3,779Updated last week
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,817Updated last week
- yarGen is a generator for YARA rules☆1,759Updated 2 months ago
- GRR Rapid Response: remote live forensics for incident response☆5,008Updated last week
- Defeating Windows User Account Control☆7,214Updated 2 weeks ago
- Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management☆3,108Updated 4 years ago
- Please no pull requests for this repository. Thanks!☆2,380Updated last week
- Empire is a PowerShell and Python post-exploitation agent.☆7,755Updated 5 years ago
- A curated list of Awesome Threat Intelligence resources☆9,518Updated 2 weeks ago
- Malware Configuration And Payload Extraction☆2,869Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,801Updated 5 years ago
- ☆22Updated 4 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,248Updated 6 months ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,760Updated 5 months ago
- Some setup scripts for security research tools.☆9,233Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,212Updated 3 weeks ago
- Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.☆7,323Updated last week
- Main Sigma Rule Repository☆9,948Updated this week
- Modern Honey Network☆2,468Updated last year
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,379Updated 10 months ago
- Automated Adversary Emulation Platform☆6,629Updated this week
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,834Updated 3 years ago