A tool for scrapping the possible malware from the Wikileaks AKP leak
☆102Oct 24, 2016Updated 9 years ago
Alternatives and similar repositories for wlscrape
Users that are interested in wlscrape are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various scripts helpful in sorting collections of malware samples.☆38Aug 19, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 6 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- ☆16Mar 20, 2026Updated last month
- ☆68Jun 21, 2017Updated 8 years ago
- BadUSB 2.0 USB-HID MiTM POC☆290Jun 22, 2016Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- Malware exploits☆559Aug 22, 2025Updated 8 months ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Oct 2, 2018Updated 7 years ago
- A collection of steganography tools.☆15Nov 2, 2020Updated 5 years ago
- A quick POC on how to embed a meterpreter in Firefox via DLL hijacking☆17Jul 6, 2017Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Tools for 802.11 information gathering.☆119May 9, 2022Updated 3 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆12Jun 24, 2017Updated 8 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆37May 4, 2016Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Honeypot Intelligence with Splunk☆255Oct 18, 2018Updated 7 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- 8ball☆17Sep 7, 2023Updated 2 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Feb 22, 2017Updated 9 years ago