fboldewin / ATMMalScan
☆51Updated 3 years ago
Alternatives and similar repositories for ATMMalScan:
Users that are interested in ATMMalScan are comparing it to the libraries listed below
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Repository of tools used in my blog☆50Updated 11 months ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆24Updated 6 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- ☆24Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Free Advance encryptor for Anon Cloud☆17Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆86Updated 11 months ago
- ☆17Updated 5 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆28Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Some YARA rules i will add from time to time☆64Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 9 months ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 2 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Create visualization from Shodan query☆72Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- pen testing scripts☆11Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 2 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago