avuko / aiki
aiki.go source code and analysis
☆15Updated 7 years ago
Related projects: ⓘ
- ☆21Updated 6 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Updated 8 years ago
- ☆25Updated 7 years ago
- ☆9Updated 6 years ago
- ☆37Updated this week
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Updated 7 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 6 years ago
- ☆11Updated this week
- ☆13Updated this week
- Talk given at DerbyCon and RuxCon 2016☆22Updated 7 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 5 years ago
- ☆19Updated this week
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- An offensive Powershell console☆30Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Updated 7 years ago
- Randori: Like Aiki. With a couple of Dans under its belt.☆14Updated 6 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Updated 8 years ago
- ☆26Updated this week
- Collection of my Python Scripts☆41Updated 4 years ago
- Frontend for Codex Gigas☆21Updated 7 years ago
- ☆46Updated this week
- This tool will extract useful information from the McAfee update SiteList file and decrypt the associated password for each entry.☆26Updated 6 years ago
- ☆27Updated this week
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- ☆22Updated this week
- Automated memory forensics analysis☆32Updated 5 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- ☆47Updated this week
- A tool to catch spoofed NBNS responses.☆48Updated 6 years ago