iTrooz / nmap-appimageLinks
A self-contained nmap package, using the AppImage format, for use in compromised systems
☆13Updated last year
Alternatives and similar repositories for nmap-appimage
Users that are interested in nmap-appimage are comparing it to the libraries listed below
Sorting:
- Bless - Gtk# Hex Editor☆245Updated 2 years ago
- GNU/Linux packaging solution using the AppImage format☆364Updated 6 months ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆397Updated 7 months ago
- A low-level tool to generate an AppImage from an existing AppDir☆316Updated 2 months ago
- Dark theme installer for Ghidra☆581Updated 2 years ago
- Firmware Analysis Tool☆174Updated last year
- High Octane Triage Analysis☆808Updated this week
- Vmware Host Module.☆135Updated last year
- Graphical user interface for ddcutil - control monitor settings☆226Updated this week
- Improved On Screen Keyboard for Gnome Shell☆101Updated 2 years ago
- Ghidra utilities for analyzing PC firmware☆466Updated 3 weeks ago
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,184Updated 3 years ago
- Hex editor for viewing and editing the raw data of files☆135Updated last week
- Identifies the bytes that Microsoft Defender flags on.☆2,581Updated last month
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆797Updated last year
- EDR Lab for Experimentation Purposes☆1,409Updated 3 weeks ago
- A tool that shows detailed information about named pipes in Windows☆732Updated last year
- The Secure Microsoft Windows Downloader☆646Updated last year
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆597Updated last year
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,123Updated last year
- ☆520Updated 2 years ago
- Python Command-Line Ghidra Binary Diffing Engine☆737Updated 4 months ago
- The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.☆243Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆744Updated 8 months ago
- A list of public attacks on BitLocker☆407Updated 6 months ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆318Updated 3 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,398Updated 3 weeks ago
- qqX Virtual Machine Manager - Next level front end for Quickemu / Qemu provides easy builds of Windows, Mac and Linux. Ideal for advanced…☆101Updated last week
- Because AV evasion should be easy.☆854Updated last year
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆115Updated 4 years ago