MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
☆22Feb 11, 2021Updated 5 years ago
Alternatives and similar repositories for MultiAV-Extended
Users that are interested in MultiAV-Extended are comparing it to the libraries listed below
Sorting:
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Leetcode solutions☆15Dec 24, 2025Updated 2 months ago
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆40Feb 10, 2022Updated 4 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆19Jul 14, 2022Updated 3 years ago
- ☆19Oct 5, 2020Updated 5 years ago
- ☆22Mar 14, 2024Updated last year
- Immediate Virus Infection Counter Measures☆63Apr 13, 2021Updated 4 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated 2 months ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- ☆24Mar 8, 2017Updated 8 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- ☆27Jun 29, 2023Updated 2 years ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- shouganaiyo-loader is a cross-platform Frida-based Node.js command-line tool that forces Java processes to load a Java/JVMTI agent regard…☆39Dec 30, 2021Updated 4 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆34Mar 4, 2021Updated 4 years ago
- 🔑 Simple MinIO access and secret key generator☆36Dec 19, 2021Updated 4 years ago
- A Guide to Hackintoshing Dell XPS 13 9370☆10Oct 4, 2024Updated last year
- CTFd plugin allowing for individual Docker containers per user or team☆10Oct 14, 2024Updated last year
- WhatsCloud is an android app which allows you to analyze your WhatsApp chat history on the fly with only one click☆12Jul 29, 2019Updated 6 years ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆86Jun 16, 2023Updated 2 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆37Feb 12, 2016Updated 10 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- Simple AV Evasion for PE Files☆41Nov 21, 2021Updated 4 years ago
- Example/starter code for custom Windows application compatibility shims☆38Dec 27, 2020Updated 5 years ago
- A sexy binary protocol written in c with zero-allocations☆11Dec 13, 2025Updated 2 months ago
- ☆14Feb 19, 2023Updated 3 years ago
- This tool will help you to find CVEs, exploits, or possible 0-Days for a specific technology.☆16Jun 11, 2024Updated last year
- ☆10Mar 11, 2024Updated last year
- A Simple Kiosk application built using Flutter☆13Feb 28, 2022Updated 4 years ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Fastest way to modify system wide DNS☆14Jun 10, 2025Updated 8 months ago
- Blockchain Reader Library☆10Jan 20, 2024Updated 2 years ago
- ☆12Jul 4, 2024Updated last year
- Grub Theme☆12Aug 29, 2022Updated 3 years ago