hrtywhy / HanomanLinks
Hanoman is an GUI antivirus engine sigature based detection π
β49Updated 3 years ago
Alternatives and similar repositories for Hanoman
Users that are interested in Hanoman are comparing it to the libraries listed below
Sorting:
- Collaborative malware exchange repository.β35Updated 7 months ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to penβ¦β14Updated 3 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHPβ25Updated 3 years ago
- A proof-of-concept Node.js ransomwareβ21Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executabβ¦β45Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.β51Updated 4 years ago
- Inject Metasploit Shell Code in Legitimate Processβ11Updated 4 years ago
- Sp00fer blog post -β26Updated 2 years ago
- ShellC0de Generatorβ11Updated 4 years ago
- Repository of tools used in my blogβ51Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.β25Updated 2 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 4 years ago
- Reverse shell using Windows Registry files (.reg)β17Updated 5 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 6 years ago
- A tool to check for response status codes with easeβ14Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing themβ20Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.β39Updated 4 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β12Updated 3 years ago
- Simple C2 over the Trello APIβ38Updated 2 years ago
- Alleged source code leak of Osiris banking trojanβ37Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ19Updated 5 years ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.β23Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!β15Updated 3 years ago
- Antiscan.me automatization scriptβ29Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β39Updated 3 years ago
- Host IDS for desktop usersβ12Updated 4 years ago
- β24Updated 3 years ago