☆32Apr 29, 2017Updated 8 years ago
Alternatives and similar repositories for flexikiller
Users that are interested in flexikiller are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Protection Profile for Mobile Device Fundamentals☆15Mar 17, 2026Updated last week
- A dockerized droidbox instance☆25Apr 7, 2016Updated 9 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Dec 1, 2023Updated 2 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- Detonate malware on VMs and get logs & detection status☆89Mar 17, 2026Updated last week
- List of Red Team Resources☆17Jun 16, 2020Updated 5 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Running TaintDroid from the command line and analyze output☆17Mar 28, 2012Updated 13 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- VirtualBox Disk Image Encryption password cracker☆31Oct 6, 2015Updated 10 years ago
- A port of Kate Compton's Tracery to C#/Unity3d☆20Mar 4, 2017Updated 9 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 8 years ago
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Linux Log Cleaner (wtmp, utmp & lastlog)☆22Dec 1, 2017Updated 8 years ago
- Very very useful example of loading and relocating the (Win32) DLL from memory (!) which allows many possibilities and much more flexibil…☆20Jan 2, 2013Updated 13 years ago
- Simple spill-to-disk dictionary☆18May 24, 2016Updated 9 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Kindle Fire Device and Vendor folders for CM9 (ICS)☆23Jan 10, 2019Updated 7 years ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Cloudflare Worker to analyze SEO of input website using Cloudflare browser rendering and Llama-3.2 hosted on Workers AI☆12Jan 22, 2025Updated last year
- Github for the scripts utilised during Penetration test☆237Jun 12, 2017Updated 8 years ago
- Sorano☆16Jul 30, 2019Updated 6 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- Suricata rules for Emerging Threats and funkyness☆75May 15, 2017Updated 8 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Identify web application versions☆18Apr 14, 2017Updated 8 years ago
- ☆13Jul 29, 2020Updated 5 years ago