Template to detect some malware
☆14Aug 7, 2023Updated 2 years ago
Alternatives and similar repositories for nuclei-malware
Users that are interested in nuclei-malware are comparing it to the libraries listed below
Sorting:
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Atlassian Jira Server/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)☆25Oct 12, 2021Updated 4 years ago
- In this repo, I have created a subdomain enumeration function that grab subdomains in deep.☆23Mar 19, 2023Updated 2 years ago
- Links to VeteranSec Resources☆11May 18, 2020Updated 5 years ago
- ☆11Sep 15, 2024Updated last year
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆18May 11, 2021Updated 4 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Kumpulan slide presentasi seminar, talk, workshop☆14Nov 11, 2025Updated 3 months ago
- ☆10Mar 11, 2024Updated last year
- Belajar Typescript☆10Nov 26, 2019Updated 6 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- A utility for recursively traversing SSL/TLS certificates for collecting DNS names☆48Aug 26, 2023Updated 2 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- ROS2 package for the Arctos arm☆16Oct 3, 2025Updated 5 months ago
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- ☆13Jan 23, 2026Updated last month
- A template repository to deploy a robust queueing system on Railway using BullMQ and Redis.☆13May 26, 2024Updated last year
- my nuclei templates #new☆11Jun 24, 2024Updated last year
- ☆11Jul 11, 2023Updated 2 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- ☆12Dec 20, 2022Updated 3 years ago
- Simple, minimalistic and configurable RESTful API☆11Dec 9, 2018Updated 7 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- will add all data science project that I'll do.☆11May 14, 2022Updated 3 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago