m4rco- / dorothy2View external linksLinks
A malware/botnet analysis framework written in Ruby.
☆195Sep 26, 2023Updated 2 years ago
Alternatives and similar repositories for dorothy2
Users that are interested in dorothy2 are comparing it to the libraries listed below
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Wrapper class for IDAPython. Regroups various useful functions for reverse engineering of binaries.☆17Mar 17, 2016Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 9 months ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Jan 10, 2017Updated 9 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆458Oct 16, 2023Updated 2 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Nmap scans of Internet of Things devices☆121Jun 5, 2015Updated 10 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- A VBScript for detecting VirtualBox☆21Jul 29, 2015Updated 10 years ago
- OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web usin…☆163Jan 21, 2021Updated 5 years ago
- 很简单的webshell扫描☆55Aug 8, 2017Updated 8 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- hackers-grep is a utility to search for strings in PE executables including imports, exports, and debug symbols☆171Jul 7, 2018Updated 7 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time…☆398May 20, 2016Updated 9 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- LibreSSL with a backdoor in RSA key generation☆17Jun 26, 2016Updated 9 years ago
- Some tools to proccess tcpdump dumps☆16Nov 22, 2015Updated 10 years ago
- A network analysis algorithm for detecting bots on large networks.☆20Apr 15, 2013Updated 12 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Open source reverse-engineering tool, mainly targeted towards embedded systems☆22Sep 27, 2009Updated 16 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago