dogancanbakir / metamaska
μετάμάσκα - malevolent payload classifier
☆24Updated last year
Alternatives and similar repositories for metamaska:
Users that are interested in metamaska are comparing it to the libraries listed below
- pîrebok (from Kurdish "witch") - a guided adversarial fuzzer☆14Updated 2 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- ☆18Updated last year
- Decrypt encrypted SonicOSX firmware images☆14Updated 2 months ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆16Updated 9 months ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆21Updated last year
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- ☆11Updated this week
- CLI Search for Security Operators of MITRE ATT&CK URLs☆16Updated 2 years ago
- Golang Shlyuz Implant Implementation☆12Updated 2 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- 3gsocks - a reverse connection socks5 based network pivot☆10Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆11Updated 2 years ago
- ☆15Updated 2 years ago
- ☆12Updated 2 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆21Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Updated 2 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last week
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated 2 months ago
- Active Directory Password Spray Testing Utility in Go☆16Updated last year