Premantel - A Malware analysis and Threat Intel Framework
☆36Mar 22, 2019Updated 7 years ago
Alternatives and similar repositories for premantel
Users that are interested in premantel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Web of trust grapher☆40Feb 25, 2026Updated last month
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Fast incident overview☆41Feb 11, 2017Updated 9 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Dec 11, 2019Updated 6 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- A repo for holding cheat sheets for myself that cover various penetration testing tools and commands.☆41May 21, 2018Updated 7 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- Reading List for CSIRT Team Members☆17Oct 21, 2019Updated 6 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Apr 12, 2022Updated 4 years ago
- Parse Microsoft shim databases☆32Jan 8, 2025Updated last year
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 months ago
- A C# based tool for analysing malicious OneNote documents☆118Apr 4, 2023Updated 3 years ago
- Static feature extraction framework for executable file. In malware analysis we need get all possible information for executable files. I…☆13Jun 4, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- open-source intelligence gathering for SIEMs <3☆38Feb 16, 2017Updated 9 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation. Pwntools rocks!☆50Apr 6, 2018Updated 8 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆132Dec 22, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 4 years ago
- Discover target social media profiles☆81Sep 26, 2022Updated 3 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago