Information Stealers Wall of Sheep (IS-WOS)
☆11Nov 13, 2020Updated 5 years ago
Alternatives and similar repositories for is-wos
Users that are interested in is-wos are comparing it to the libraries listed below
Sorting:
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- Crack ios Restriction PassCode in Python☆38Sep 30, 2020Updated 5 years ago
- Hacks through Khan Academy lessons☆14Dec 27, 2023Updated 2 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Designed an algorithm to detect a license plate from a car and then used OCR to rcognize the Plate☆13Feb 19, 2014Updated 12 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆12Oct 1, 2021Updated 4 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- Automatically transfers funds from Paypal account into you bank account☆11Jul 20, 2020Updated 5 years ago
- an experimental implementation of Burrow's delta in Python 3☆12Jun 6, 2017Updated 8 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 9 months ago
- Telegram base free Rat☆12Apr 26, 2025Updated 10 months ago
- A flake8 plugin that checks bad async / asyncio practices☆12Feb 19, 2024Updated 2 years ago
- ios hacking tool☆10Mar 24, 2021Updated 4 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated last month
- A script to generate multiple Privacy credit cards.☆11May 8, 2018Updated 7 years ago
- It exploits the chrome vulnerability and gets the all saved credentials in chrome☆10Jun 22, 2020Updated 5 years ago
- Minimal, customisable & powerful antivirus project☆10Mar 11, 2019Updated 6 years ago
- Ruby gem for various VIN (Vehicle Identification Number) related tasks☆13Sep 28, 2022Updated 3 years ago
- Gift Card Email Extractor☆11Jun 29, 2021Updated 4 years ago
- Update an ECS service to use a new Docker image☆13Mar 1, 2026Updated last week
- tools, hacks and stuff for iOS (this is old stuff based on an old iOS version and wasn't tested for functioning on recent iOS devices)☆13Jan 11, 2016Updated 10 years ago
- Automatically exported from code.google.com/p/auto-reaver☆13Mar 22, 2015Updated 10 years ago
- BitView's translations.☆11Sep 30, 2025Updated 5 months ago
- This is a folder with 69 files, and this is a 34 GDI effects(1 file is CMakeList.txt), 34 - compiled files, 34 source code files. Thanks …☆11Mar 10, 2024Updated last year
- This is a web site scraper. Collects all urls from any site.☆16Apr 28, 2015Updated 10 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Next Generation of White Chapel☆21Oct 17, 2014Updated 11 years ago
- 免杀木马样本☆103Oct 11, 2025Updated 4 months ago
- First it steals.. Then it jettisons.☆69Nov 20, 2012Updated 13 years ago