ditekshen / is-wosView external linksLinks
Information Stealers Wall of Sheep (IS-WOS)
☆11Nov 13, 2020Updated 5 years ago
Alternatives and similar repositories for is-wos
Users that are interested in is-wos are comparing it to the libraries listed below
Sorting:
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 3 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- Crack ios Restriction PassCode in Python☆38Sep 30, 2020Updated 5 years ago
- Hacks through Khan Academy lessons☆14Dec 27, 2023Updated 2 years ago
- ☆31Feb 3, 2026Updated last week
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Start here!☆11Feb 19, 2020Updated 5 years ago
- Designed an algorithm to detect a license plate from a car and then used OCR to rcognize the Plate☆13Feb 19, 2014Updated 11 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Python wrapper for Aruba Orchestrator and Edge Connect API☆17Dec 17, 2025Updated last month
- Telegram base free Rat☆11Apr 26, 2025Updated 9 months ago
- ☆12Oct 1, 2021Updated 4 years ago
- Automatically transfers funds from Paypal account into you bank account☆11Jul 20, 2020Updated 5 years ago
- My simple configuration of a TIC(Telegraf, InfluxDB and Chronograf), Speedtest and Grafana, to follow my network speed and quality☆10Mar 10, 2021Updated 4 years ago
- Android backdoored app, improved source code of msfvenom android .apk☆12May 31, 2019Updated 6 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Leech Tools (Free Version) provides fraud tools such us Credit Card Generator, Bank Identification Number Lookup and Credit Card Validity…☆11May 9, 2019Updated 6 years ago
- CakePHP plugin to facilitate interacting with Braintree.com's API using Transparent Redirect and Vaulted credit card information☆17Nov 12, 2018Updated 7 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆49Jan 19, 2026Updated 3 weeks ago
- this used to be a private virus but i have it so now its not☆12Oct 18, 2021Updated 4 years ago
- Minimal, customisable & powerful antivirus project☆10Mar 11, 2019Updated 6 years ago
- an experimental implementation of Burrow's delta in Python 3☆12Jun 6, 2017Updated 8 years ago
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Automate buying Amazon Gift Cards☆10Jan 15, 2019Updated 7 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- Sharp Aquos IP Remote for SmartThings☆10Oct 21, 2015Updated 10 years ago
- Update an ECS service to use a new Docker image☆13Updated this week
- Top 10 million and top ~800 million passwords sorted from the newest breach compilation (leaked early 2019 and and a total of 3.2 Billio…☆12May 30, 2020Updated 5 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- A bot that uses various APIs to scan links directly inside any discord server automatically☆14Jun 10, 2025Updated 8 months ago
- Ruby gem for various VIN (Vehicle Identification Number) related tasks☆13Sep 28, 2022Updated 3 years ago
- It exploits the chrome vulnerability and gets the all saved credentials in chrome☆10Jun 22, 2020Updated 5 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago