Malware-Analysis-Kit
☆14Aug 3, 2015Updated 10 years ago
Alternatives and similar repositories for MAK
Users that are interested in MAK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13May 4, 2020Updated 5 years ago
- hikvision android sdk,海康威视安卓二次开发sdk☆16Mar 31, 2020Updated 5 years ago
- Detects humans on camera streams and alerts users via Telegram Bot. Tested with HikVision.☆16Mar 5, 2026Updated 2 weeks ago
- Brute Force Hikvision Devices that only allow PIN passwords☆20Sep 10, 2024Updated last year
- Check your websites for viruses automatically using multiple anti-virus engines.☆14Nov 7, 2025Updated 4 months ago
- Decides if provided domains are safe based on DNS threat blocking providers intelligence. Does not required to have any blocklist.☆15Jan 10, 2018Updated 8 years ago
- DFORC2 is a cloud-based digital forensics platform, developed at the RAND Corporation and backed by Autopsy and The Sleuth Kit. This repo…☆13Jul 9, 2020Updated 5 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- This repo will consist links and resources related to CPython.☆29Dec 22, 2020Updated 5 years ago
- Toolkit for Go(Golang) development.☆20Jan 4, 2026Updated 2 months ago
- ☆20Oct 6, 2019Updated 6 years ago
- Files used in the weekly sessions☆11Updated this week
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- Azericard plugin for WooCommerce☆19May 7, 2018Updated 7 years ago
- 从 HAR 文件 下载整个网站资源☆15Jan 16, 2017Updated 9 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- CVE-2020-2021☆22Oct 12, 2020Updated 5 years ago
- ☆28May 25, 2021Updated 4 years ago
- ☆12Jun 8, 2018Updated 7 years ago
- node.js - Türkçeleştirme takımı☆33May 18, 2021Updated 4 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- My learning guide for preparation of the CISSP exam☆13Apr 8, 2015Updated 10 years ago
- ☆13Sep 21, 2017Updated 8 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- Skills To Improve Before Heading to OSCP☆15May 14, 2017Updated 8 years ago
- GoLang File Examples☆13Nov 20, 2018Updated 7 years ago
- Simple python tool to search http://ixirc.com/☆10Apr 16, 2019Updated 6 years ago
- Burp Suite Extension to monitor new scope☆16Mar 31, 2021Updated 4 years ago
- Real-time Packet Observation Tool☆39Sep 26, 2023Updated 2 years ago
- Website searcher for SEO comparisons / OSINT☆11Oct 13, 2019Updated 6 years ago
- Pwn2Win CTF 2019 flag submissions☆14May 28, 2020Updated 5 years ago
- HTTP Protocol Stack CVE-2021-31166☆13Oct 17, 2024Updated last year
- ☆12Apr 7, 2021Updated 4 years ago