You'll never take me alive.
☆85May 9, 2014Updated 11 years ago
Alternatives and similar repositories for yontma
Users that are interested in yontma are comparing it to the libraries listed below
Sorting:
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆10May 30, 2015Updated 10 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- ☆14Oct 5, 2015Updated 10 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Discover TimeDateStamps In PE File☆17Dec 12, 2015Updated 10 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Ansible Playbook for setting up Datasploit☆14Aug 26, 2016Updated 9 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Updated version of ADT Tools with simplified user interface and enhanced functions.☆22Oct 19, 2020Updated 5 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Sep 15, 2015Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- ☆84Oct 8, 2023Updated 2 years ago
- ☆84May 19, 2015Updated 10 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Sensors for the datacenter to protect against intruders and high temperatures☆18Sep 13, 2016Updated 9 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago