bediger4000 / malware-phylogeny
malware phylogeny for WSO web shell, Shellbot IRC bot and algorithm
☆17Updated 2 years ago
Alternatives and similar repositories for malware-phylogeny:
Users that are interested in malware-phylogeny are comparing it to the libraries listed below
- FTP Honeypot☆31Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Updated 2 weeks ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆43Updated last year
- Ideaslocas Repository☆37Updated 3 years ago
- recon-ng modules for Censys☆37Updated last year
- Scrape/Parse Pastebin using GO and expression grammar (PEG)☆97Updated 4 months ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- A collection of personal ZAP scripts☆14Updated 2 years ago
- A continuously curated list of my favorite links and resources relating to Open Source Intelligence gathering.☆19Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆25Updated 6 years ago
- recover Firefox and more browsers logins☆49Updated 3 years ago
- Collect email addresses by crawling search engine results.☆29Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- An OSINT tool to find data leaks on a targeted website☆16Updated 4 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- Selenium based web scraper to generate passwords list☆51Updated 4 years ago
- bap - http Basic Authentication honeyPot☆49Updated 10 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 9 months ago
- Truehunter☆31Updated 3 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago
- find where an image is taken☆18Updated 2 years ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆28Updated 6 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated last year