A tool for scrapping the possible malware from the Wikileaks AKP leak
☆101Oct 24, 2016Updated 9 years ago
Alternatives and similar repositories for wlscrape
Users that are interested in wlscrape are comparing it to the libraries listed below
Sorting:
- Various scripts helpful in sorting collections of malware samples.☆38Aug 19, 2016Updated 9 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆102Aug 24, 2016Updated 9 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- BadUSB 2.0 USB-HID MiTM POC☆288Jun 22, 2016Updated 9 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆122Oct 2, 2018Updated 7 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Challenge for the 33C3 CTF☆15Jan 3, 2017Updated 9 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Offline, client-side encrypted plaintext editor in an HTML file☆22Jan 29, 2016Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- ☆79May 13, 2016Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- A sample project for using Capstone from a driver in Visual Studio 2015☆36May 4, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Tools for 802.11 information gathering.☆119May 9, 2022Updated 3 years ago
- ☆12Jun 24, 2017Updated 8 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Protocol Learning and Stateful Fuzzing☆355Jun 7, 2022Updated 3 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- IDA Pro plugin making easier work on BinDiff results☆80Mar 25, 2016Updated 9 years ago
- ☆15Jul 12, 2020Updated 5 years ago
- ☆17Mar 22, 2018Updated 7 years ago