Malicious Microsoft Office document analyzer
☆68Dec 20, 2023Updated 2 years ago
Alternatives and similar repositories for maldoca
Users that are interested in maldoca are comparing it to the libraries listed below
Sorting:
- ☆10Aug 18, 2025Updated 6 months ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- A standalone Android library for downloading and managing files on device.☆26Sep 29, 2023Updated 2 years ago
- ☆13Jul 11, 2017Updated 8 years ago
- DHCP server that talks GRPC☆15Jul 8, 2017Updated 8 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- protocall is an experimental programming language☆13Nov 20, 2016Updated 9 years ago
- ☆17Jun 22, 2023Updated 2 years ago
- Documents to HTML converter☆16Feb 10, 2018Updated 8 years ago
- Media Extractor is an application to preview and extract packed media in Microsoft Office files (e.g. Word, PowerPoint or Excel documents…☆13Jul 15, 2025Updated 7 months ago
- ☆21Jun 3, 2021Updated 4 years ago
- Google CVE related code☆15Jul 20, 2023Updated 2 years ago
- an Improoved Version of 0xNinjaCyclone´s EarlyCascade Code☆22Feb 20, 2025Updated last year
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- ☆18Apr 4, 2017Updated 8 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- Security middleware to defend against SQL injection in Active Record.☆18Aug 4, 2025Updated 7 months ago
- KVM Virtual Machine Introspection Library☆48Dec 13, 2023Updated 2 years ago
- Scripts to automate the creation of service accounts for Google Workspace migration products☆29Jan 6, 2026Updated last month
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- ☆24Sep 12, 2024Updated last year
- cross platform library to manipulate and extract information of memory regions☆34Apr 10, 2018Updated 7 years ago
- DDoor - cross platform backdoor using dns txt records☆30Sep 27, 2021Updated 4 years ago
- Automate SSH key management☆66Oct 26, 2022Updated 3 years ago
- Repository for the Enterprise Certificate Proxy project.☆29Feb 9, 2026Updated 3 weeks ago
- ☆30Feb 20, 2026Updated last week
- a vba pcode decompiler based on pcodedmp☆112Sep 15, 2021Updated 4 years ago
- ☆129Feb 19, 2026Updated 2 weeks ago
- 以shellcode注入其它驱动执行,躲避驱动签名检测,曾pubg项目中使用,,,当然现在,,,☆27Oct 19, 2022Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- ☆35Oct 18, 2022Updated 3 years ago
- Minimal setup to trigger the xz backdoor☆29Oct 19, 2024Updated last year
- Collection of auditory models.☆33Feb 4, 2024Updated 2 years ago
- This project has been moved from a private repository☆26Jun 4, 2018Updated 7 years ago