Print the strings of encoded printable characters in files
☆12Jul 19, 2015Updated 10 years ago
Alternatives and similar repositories for xstrings
Users that are interested in xstrings are comparing it to the libraries listed below
Sorting:
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆12Aug 27, 2014Updated 11 years ago
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- search and collect windows files from multiple locations on machine and store in one centralized directory☆20Aug 29, 2012Updated 13 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- Binary Analysis Platform☆74Oct 21, 2013Updated 12 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- ☆19Aug 13, 2015Updated 10 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- INACTIVE - http://mzl.la/ghe-archive - Unit Tests for your Network -☆44Mar 29, 2019Updated 6 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- The plugin is an integration of Virus Battle API to the well known IDA Disassembler.☆20May 26, 2015Updated 10 years ago
- Multi Cloud Antivirus Scanning API using YARA and CLAMAV for AWS S3, Azure Blob Storage and GCP Cloud Storage☆22Sep 1, 2024Updated last year
- Basic log analysis tool to detect impossible travel via IP address geographic information☆20Apr 29, 2019Updated 6 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- sqlc - Universal DBMS/SQL client with exfiltration features :)☆18Dec 19, 2023Updated 2 years ago
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- random python stuff☆26Jan 7, 2016Updated 10 years ago
- MD5 collision testing☆17Nov 24, 2024Updated last year
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago