☆54Mar 8, 2021Updated 5 years ago
Alternatives and similar repositories for ATMMalScan
Users that are interested in ATMMalScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- Carbon Black Response IR tool☆55Dec 10, 2020Updated 5 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- Script to facilitate different functions and checks☆44Aug 4, 2022Updated 3 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Scripts for hacking through wireless network [WiFi]☆26Oct 16, 2022Updated 3 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Nov 8, 2022Updated 3 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆64Aug 25, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 5 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- Upgrade kali linux default installation☆16Nov 19, 2025Updated 4 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated 10 months ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 2 years ago
- ☆93Jul 30, 2025Updated 7 months ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆10Feb 9, 2023Updated 3 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago