antoinet / virtualabLinks
Build your own cloud virtual machine lab
☆12Updated 3 weeks ago
Alternatives and similar repositories for virtualab
Users that are interested in virtualab are comparing it to the libraries listed below
Sorting:
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆15Updated last year
- ☆14Updated last year
- details about DIAL protocol vulnerabilities☆29Updated 2 years ago
- ☆23Updated last year
- ☆17Updated 10 months ago
- Network Traffic Fuzzer☆17Updated 11 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- Open YARA scan- and search engine☆25Updated 9 months ago
- ☆18Updated last year
- Tricard - Malware Sandbox Fingerprinting☆22Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- ☆16Updated last week
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- docker env for ios research on a mac host☆22Updated 6 months ago
- ☆60Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Updated 2 years ago
- Golang Shlyuz Implant Implementation☆13Updated 6 months ago
- ☆48Updated this week
- Modular web-application honeypot platform built using go and gin☆63Updated last year
- ☆27Updated 2 years ago
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 weeks ago
- ☆11Updated 2 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55Updated 7 months ago
- Find what egress ports are allowed☆46Updated 3 weeks ago
- NoirGate provides on-demand ephemeral anonymous shells secured by TOTP☆33Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year