jampe / MultiAV-ExtendedLinks
MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
☆22Updated 4 years ago
Alternatives and similar repositories for MultiAV-Extended
Users that are interested in MultiAV-Extended are comparing it to the libraries listed below
Sorting:
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆73Updated last year
- Tools that trigger False Positive AV alerts☆53Updated last year
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Updated 2 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Updated 2 years ago
- ☆18Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- C# User Simulation☆33Updated 3 years ago
- pypykatz plugin for volatility3 framework☆46Updated 8 months ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Updated last year
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- ☆66Updated 2 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- ProcDot Malware Sandbox☆26Updated 6 months ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- ☆23Updated 5 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 6 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated 2 years ago
- (kinda) Malicious Outlook Reader☆138Updated 4 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago