☆23Mar 17, 2024Updated 2 years ago
Alternatives and similar repositories for gtpdoor-scan
Users that are interested in gtpdoor-scan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- 5G Orchestration made easy☆15Apr 29, 2025Updated 11 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- ysoserial.net docker image☆29Sep 23, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆12Jun 29, 2021Updated 4 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- ☆14Mar 9, 2023Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆62Mar 21, 2026Updated last week
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated last month
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Web Application for domain name monitoring / alerting☆65Aug 1, 2024Updated last year
- ☆18Mar 26, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- GTPv1/GTPv2 Dialer☆31Nov 26, 2025Updated 4 months ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Jul 27, 2020Updated 5 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- A tool for studying JavaScript malware.☆15Mar 20, 2026Updated last week
- ☆16Oct 18, 2024Updated last year
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Dec 22, 2020Updated 5 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- A code skeleton of Samsung's Shannon5123 5G baseband modem.☆20May 6, 2020Updated 5 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last month
- ☆18Apr 4, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆38Jan 2, 2025Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- enpoint detection / live analysis & sandbox host / signatures quality test☆44Apr 22, 2021Updated 4 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago