☆54Mar 8, 2021Updated 5 years ago
Alternatives and similar repositories for ATMMalScan
Users that are interested in ATMMalScan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- Some YARA rules i will add from time to time☆68Mar 25, 2023Updated 3 years ago
- Analysis of the XFS_DIRECT ATM malware used for jackpotting with a PI ZERO W and the P4WNP1 framework on board☆161Oct 22, 2019Updated 6 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Jun 2, 2025Updated 11 months ago
- Carbon Black Response IR tool☆56Dec 10, 2020Updated 5 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Scripts for hacking through wireless network [WiFi]☆27Oct 16, 2022Updated 3 years ago
- JXA implementation of some SwiftBelt functions. Author: Cedric Owens☆46Jun 22, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Us…☆376Nov 8, 2022Updated 3 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆14May 8, 2021Updated 4 years ago
- ☆46Dec 30, 2018Updated 7 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- Upgrade kali linux default installation☆15Nov 19, 2025Updated 5 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- Public tools, scripts or code snippets that can help when working with our products☆47Mar 12, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- his program shows you IMSI numbers, country, brand and operator of cellphones around you. /!\ This program was made to understand how GS…☆13Dec 27, 2018Updated 7 years ago
- A Golang CLI for the MITRE ATT&CK Framework☆14Apr 28, 2025Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆134Sep 12, 2021Updated 4 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies☆325Apr 8, 2023Updated 3 years ago
- ☆93Jul 30, 2025Updated 9 months ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- C# exfiltration tool☆13Sep 24, 2021Updated 4 years ago
- The goal of this project was to develop a chat-bot based data collection tool. It asks users questions through a validated alignment surv…☆13Feb 20, 2026Updated 2 months ago
- ☆23Jun 1, 2023Updated 2 years ago