A Pastebin scraper designed to look for malicious content
☆20Nov 20, 2019Updated 6 years ago
Alternatives and similar repositories for fiercecroissant
Users that are interested in fiercecroissant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆22Apr 1, 2026Updated last month
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- LLM tokenizer in Zig☆15Dec 7, 2025Updated 5 months ago
- Very simple Netflix API client☆24Jun 30, 2010Updated 15 years ago
- Search across social media and DuckDuckGo☆12May 22, 2014Updated 11 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- collection of bro and bash scripts that when run from the same directory on Linux distro with bro installed, will pull information such a…☆12Mar 29, 2016Updated 10 years ago
- GreyNoise Maltego integration and transforms☆20Mar 14, 2023Updated 3 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆25Mar 27, 2017Updated 9 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- ☆28Mar 24, 2020Updated 6 years ago
- ROP Benchmark is a tool to compare ROP compilers☆44Jan 26, 2023Updated 3 years ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A framework for analyzing/testing/fuzzing network applications.☆46Jan 1, 2019Updated 7 years ago
- My collection of dockerfiles☆24Feb 15, 2016Updated 10 years ago
- Self-modifying Code de-obfuscation☆17May 17, 2017Updated 8 years ago
- String obfuscator based on the Mealy automata☆13Sep 16, 2017Updated 8 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆16Apr 14, 2020Updated 6 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Oct 10, 2019Updated 6 years ago
- Repo for hosting various scripts for creating users for password spraying and other password attacks.☆11Jul 9, 2020Updated 5 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Applied Symbolic Execution with KLEE/LLVM☆24Jun 7, 2013Updated 12 years ago
- ☆37Jul 10, 2015Updated 10 years ago
- LittleCorporal: A C# Automated Maldoc Generator☆227Jul 30, 2021Updated 4 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago