You'll never take me alive.
☆85May 9, 2014Updated 11 years ago
Alternatives and similar repositories for yontma
Users that are interested in yontma are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆10May 30, 2015Updated 10 years ago
- OSX Security Compliance & Hardening☆47Aug 13, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Memory forensics of virtualization environments☆48Oct 4, 2014Updated 11 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Jun 24, 2014Updated 11 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Sep 15, 2015Updated 10 years ago
- ☆22Dec 31, 2018Updated 7 years ago
- Phishing webapp generator☆42Aug 17, 2018Updated 7 years ago
- initrd hook allowing LUKS-encrypted devices to be unlocked remotely over SSH☆10Nov 15, 2025Updated 4 months ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Searches various online resources to try and get as much info about an IP/domain as possible.☆100Jan 15, 2014Updated 12 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- PowerShell script to bypass UAC using DCCW☆19Jul 29, 2017Updated 8 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- ☆40Feb 23, 2016Updated 10 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Veil Catapult is no longer supported☆75May 24, 2016Updated 9 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- Detect passive activity in the Tor-network☆13May 11, 2015Updated 10 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- ☆84May 19, 2015Updated 10 years ago