Batch scripts to capture volatile and log information from a target system
☆21Oct 9, 2014Updated 11 years ago
Alternatives and similar repositories for Tr3Secure
Users that are interested in Tr3Secure are comparing it to the libraries listed below
Sorting:
- AES Ransomware in batch☆11Jun 25, 2024Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- A Lightweight Malware Configuration Parsing Tool☆15Nov 6, 2019Updated 6 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆17Nov 24, 2020Updated 5 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- A cryptographic crib maniplation tool☆20Aug 16, 2025Updated 6 months ago
- Web Footprinting Tool☆21Jan 27, 2019Updated 7 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- Second blog post about Qiling. This time I finished analyzing the vulnerability and I wrote an exploit that runs under the emulated envir…☆16Sep 11, 2020Updated 5 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 3 months ago
- This is a large list of ransomware decryptor from various link. Consist from various type of ransomware. Feel free to contribute.☆17Mar 3, 2017Updated 8 years ago
- Command and Control server on Slack☆29Jan 30, 2019Updated 7 years ago
- Source Code of Jigsaw Ransomware Created in Vb.Net☆20Mar 16, 2018Updated 7 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 10 years ago
- The Pentester's Swiss Army Knife☆26Jan 25, 2020Updated 6 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Dec 16, 2016Updated 9 years ago
- Finding code caves in ELF files with GoLang☆26Jan 15, 2018Updated 8 years ago
- Development guide for Volatility Plugins☆22Sep 6, 2017Updated 8 years ago
- de4dot mod by HTC & Ngôn Nguyễn☆28Aug 18, 2020Updated 5 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Mar 13, 2017Updated 8 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆79Jan 8, 2026Updated last month
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- [deprecated] see README☆42May 15, 2020Updated 5 years ago
- Standalone Windows tool to automatically retrieve Sysinternals' AD Explorer search output from the ListView control and save/copy to clip…☆38Apr 12, 2016Updated 9 years ago
- Explanation and code to emulate and run a MIPS binary using Qiling framework. Also a detailed vulnerability writeup for a buffer overflow…☆36Nov 18, 2020Updated 5 years ago
- ☆11Updated this week
- Virtual Master runs another Android System on your device, based on our Android on Android Virtualization Technology.☆16May 11, 2023Updated 2 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- LittleSnitch Log Statistics Exporter☆35Apr 16, 2023Updated 2 years ago
- RAS(RAndom Subdomain) Fuzzer☆42Jan 22, 2020Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago