jampe / MultiAV-ExtendedLinks
MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
☆22Updated 4 years ago
Alternatives and similar repositories for MultiAV-Extended
Users that are interested in MultiAV-Extended are comparing it to the libraries listed below
Sorting:
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆70Updated last year
- Tools that trigger False Positive AV alerts☆53Updated 10 months ago
- C# User Simulation☆33Updated 3 years ago
- ☆23Updated 5 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆29Updated 2 years ago
- Lazarus analysis tools and research report☆57Updated last year
- Just another useless C2 occupying space in some HDD somewhere.☆21Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆64Updated 2 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 3 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- ☆67Updated 2 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- ProcDot Malware Sandbox☆25Updated 3 months ago
- Data exfiltration and covert communication tool☆39Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- aggregated repo for all conferences and talks I am giving☆17Updated 4 years ago
- AMSI detection PoC☆31Updated 5 years ago
- Harvis is designed to automate your C2 Infrastructure.☆108Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 4 years ago
- ☆18Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated 2 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆41Updated 2 months ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Presentaciones de congresos☆54Updated last year
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago