davehull / Mal-SeineView external linksLinks
Why hunt when you can seine?
☆21May 12, 2015Updated 10 years ago
Alternatives and similar repositories for Mal-Seine
Users that are interested in Mal-Seine are comparing it to the libraries listed below
Sorting:
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 3 years ago
- ☆14Sep 24, 2012Updated 13 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- A Powershell script for frequency analysis of separated values data files.☆17Jan 22, 2014Updated 12 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- 🐥 Digital Rubber Ducky Extension for Mac☆14May 10, 2017Updated 8 years ago
- transforms html and replaces <img> tags with inline data URI driven images☆32Oct 14, 2024Updated last year
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- Script to parse Process Monitor XML log file, and give you a summary report.☆24May 4, 2016Updated 9 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- Locker Decrypter - Python tool to decrypt files encrypted by Locker malware☆19Jun 8, 2015Updated 10 years ago
- IDApro idc and idapython script collection☆28Aug 22, 2023Updated 2 years ago
- Easy-to-use dynamic(scriptable) reverse proxy server☆27Sep 24, 2019Updated 6 years ago
- ☆28Aug 31, 2014Updated 11 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- ☆23Feb 16, 2016Updated 9 years ago
- See here:☆43Dec 6, 2012Updated 13 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- ☆78May 24, 2018Updated 7 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 3 years ago
- A repository with simple projects created for testing/learning purpose☆46Dec 18, 2025Updated last month
- An IDA Pro swiss army knife (with a sexy name!)☆56Mar 15, 2013Updated 12 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Dec 7, 2022Updated 3 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 9 years ago
- Dead simple JSON Formatter☆10Oct 21, 2016Updated 9 years ago
- ☁️ My Cloud Projects, Docs/Write-ups☆11Jul 8, 2023Updated 2 years ago
- Copy and Paste standard library (CPSTL) is a repository with a collection of data structure and algorithms in many different languages☆13Feb 15, 2025Updated last year