fportantier / mosnar
Ransomware Detection Test PowerShell Script
☆10Updated 7 years ago
Alternatives and similar repositories for mosnar
Users that are interested in mosnar are comparing it to the libraries listed below
Sorting:
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Generates anti-sandbox analysis HTA files without payloads☆15Updated 8 years ago
- ☆17Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆30Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Burp Suite plugin for the Dradis Framework☆12Updated this week
- List of scripts used for malware analysis☆15Updated 9 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- OSCP related stuff ^_^ - Try Harder!☆9Updated 6 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Mainframe bruter and screen automation utility.☆20Updated 3 years ago
- Various snippets created during malware analysis☆22Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- ☆10Updated 7 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Updated 4 years ago
- HoneyDB Python Module☆13Updated last year