SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.
☆28Sep 16, 2021Updated 4 years ago
Alternatives and similar repositories for SuperPeHasher
Users that are interested in SuperPeHasher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 2, 2025Updated 9 months ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- SEC599 supporting GitHub repository☆16Sep 14, 2019Updated 6 years ago
- ☆35Jul 20, 2021Updated 4 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A tool for detecting VBA stomping.☆102Aug 4, 2022Updated 3 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Convert XCCDF files from DISA STIG and OpenSCAP Content into Comma Separated Values files making it easier to convert into potential Open…☆16Jul 11, 2017Updated 8 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated this week
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- ☆36Nov 11, 2018Updated 7 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Apr 8, 2020Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PHP Fval(say F-word to eval) extension used to disable unsafe functions/eval with E_FATAL.☆17Sep 12, 2017Updated 8 years ago
- Proof of Concept of TrustZone exploit☆16Aug 10, 2025Updated 7 months ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- ARM is Turing-complete without data fetches☆19Mar 22, 2018Updated 8 years ago
- ☆18May 31, 2022Updated 3 years ago
- This is the code bundle of Penetration Testing with Raspberry Pi, Second-Edition book☆10Jan 14, 2021Updated 5 years ago
- Scans software in Windows and Linux and compares against the NIST Vulnerability Database to identify present vulnerabilities. Includes op…☆17Dec 25, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Detect and trap IP scanners☆11Mar 26, 2019Updated 7 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆71Jan 19, 2023Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- penetration testing ebooks for free☆12Nov 4, 2019Updated 6 years ago
- Open Source Office Malware Generation & Polymorphic Engine for Red Teams and QA testing☆95Apr 5, 2017Updated 8 years ago
- server for indexing and querying passive DNS observations☆50Jan 12, 2026Updated 2 months ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- ☆21Mar 18, 2019Updated 7 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Splunk integration with MISP☆12Apr 14, 2018Updated 7 years ago
- ES基本的CRUD操作☆16Dec 23, 2017Updated 8 years ago
- A GETTR API client written in Python.☆13Jul 14, 2021Updated 4 years ago
- Simple Powershell scripts to collect all Windows Event Logs from a host and parse them into one CSV timeline.☆32Oct 13, 2018Updated 7 years ago
- demo of an attack & defense CTF☆16Jun 4, 2018Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago