☆45Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for permhash
Users that are interested in permhash are comparing it to the libraries listed below
Sorting:
- ☆63Mar 5, 2024Updated 2 years ago
- Docker to develop plugins for ATAK☆20Mar 20, 2024Updated 2 years ago
- Installing QGroundControl (QGC) on Ubuntu ARM64 using Flatpak☆25Apr 1, 2024Updated last year
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- The first open source runtime windows batch and command line deobfuscator☆43Aug 20, 2025Updated 7 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- ☆14Feb 19, 2021Updated 5 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- PowerShell ETW consumer module☆31May 21, 2025Updated 9 months ago
- ☆63Nov 26, 2023Updated 2 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- ☆46Oct 27, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- Small visualizator for PE files☆70Sep 20, 2023Updated 2 years ago
- Scripts from Ghidra Golf competitions☆34Jan 24, 2023Updated 3 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- ☆16Jul 8, 2024Updated last year
- A recursive disassembler written in Python. Most suitable for VMs in CTFs.☆21May 20, 2020Updated 5 years ago
- PowerShell PE Parser☆63Jun 28, 2024Updated last year
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 4 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Stigma instruments the Smali assembly code of commodity Android applications in order to implement dynamic information flow tracking.☆11Nov 7, 2025Updated 4 months ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆42May 14, 2025Updated 10 months ago
- Collection of my own detection rules☆20Jan 6, 2026Updated 2 months ago
- Python library for MIME type parsing, normalisation and grouping.☆13Nov 13, 2024Updated last year
- BYOVD collection☆24Mar 20, 2024Updated 2 years ago
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- Generating YARA rules based on binary code☆220Oct 7, 2021Updated 4 years ago
- A rewrite of YARA in Rust.☆1,061Updated this week
- A ruleset to find potentially malicious code in macOS malware samples☆41Aug 29, 2023Updated 2 years ago
- vt-use-cases☆20Dec 1, 2023Updated 2 years ago
- Alternative YARA scanning engine☆73Aug 23, 2022Updated 3 years ago
- VirusTotal for Android checks the applications installed in your Android phone against VirusTotal (http://www.virustotal.com)☆19Mar 2, 2018Updated 8 years ago
- Stand-alone copy of Androguard from http://code.google.com/p/androguard/☆16Mar 13, 2014Updated 12 years ago