huebicode / abuselookup-guiView external linksLinks
A GUI to query the API of abuse.ch.
☆69Jul 10, 2022Updated 3 years ago
Alternatives and similar repositories for abuselookup-gui
Users that are interested in abuselookup-gui are comparing it to the libraries listed below
Sorting:
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Jul 7, 2022Updated 3 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizes—Linux-style find/grep/du made simple…☆22Dec 20, 2025Updated last month
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Open-Source Phishing Toolkit☆19May 23, 2021Updated 4 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- ☆46Oct 27, 2023Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆12Mar 22, 2021Updated 4 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Jul 10, 2022Updated 3 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 2 years ago
- A list of resources to build a information security team.☆13Feb 10, 2021Updated 5 years ago
- ☆18Sep 24, 2024Updated last year
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Tool to extract contents from the memory of Windows systems.☆13Jul 4, 2023Updated 2 years ago
- ☆54May 14, 2024Updated last year
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- ☆20May 30, 2025Updated 8 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 2 years ago
- ☆14May 30, 2018Updated 7 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- Trying to find unpublished leaks on solarleaks.net☆14Jan 14, 2021Updated 5 years ago