hardwaterhacker / URLCrazyLinks
URLCrazy
☆31Updated 12 years ago
Alternatives and similar repositories for URLCrazy
Users that are interested in URLCrazy are comparing it to the libraries listed below
Sorting:
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Break Apps with Frida workshop material☆42Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Tool/service to detect Man in the Middle attacks with Canary Requests☆55Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆69Updated 7 years ago
- Leak File Analyzer☆62Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Development guide for Volatility Plugins☆23Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- ☆113Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- ☆59Updated 6 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- A collection of infosec related scripts and information.☆53Updated 8 months ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago
- ☆97Updated 9 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 4 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- A warehouse for your malware☆134Updated 12 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 7 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- SMTP server / sinkhole for collecting spam☆44Updated 6 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago