hrtywhy / Hanoman
Hanoman is an GUI antivirus engine sigature based detection 🐒
☆46Updated 3 years ago
Alternatives and similar repositories for Hanoman:
Users that are interested in Hanoman are comparing it to the libraries listed below
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- ViperVenom is an open-source cyber offensive tool developed by Itay Funes for pentesters. ViperVenom is a great tool when it comes to pen…☆14Updated 2 years ago
- ☆26Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆48Updated 3 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 4 years ago
- A proof-of-concept Node.js ransomware☆21Updated 2 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 3 years ago
- Notes some analysis related to VidarStealer sample☆14Updated 8 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- ☆15Updated 2 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- ☆23Updated 2 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆16Updated 3 years ago
- Collaborative malware exchange repository.☆33Updated last month
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆40Updated 2 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated 2 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 3 years ago
- Antiscan.me automatization script☆27Updated 7 months ago