kaie / sphere-detection
Various modules to implement the DetecTor design from http://detector.kuix.de
☆52Updated 8 years ago
Alternatives and similar repositories for sphere-detection:
Users that are interested in sphere-detection are comparing it to the libraries listed below
- ☆15Updated 8 years ago
- Host files with DNS☆32Updated 8 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- ☆24Updated 9 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆28Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Firmware analysis gone wild.☆42Updated 10 years ago
- please use https://github.com/fireeye/vivisect instead☆16Updated 6 months ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- advanced code generator for John the Ripper☆12Updated 6 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Updated 7 months ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Some yara rules and tools☆16Updated 11 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Run a windows process with many inputs and catch exit codes☆14Updated 9 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Web of trust grapher☆39Updated 11 months ago
- LD_PRELOAD rootkit utils☆16Updated 9 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 13 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- An example malicious payload controller and obfuscator assisted by TPM-protected keys☆39Updated 10 years ago