Malice Kaspersky Antivirus Plugin
☆17Feb 10, 2019Updated 7 years ago
Alternatives and similar repositories for kaspersky
Users that are interested in kaspersky are comparing it to the libraries listed below
Sorting:
- Malice Bitdefender AntiVirus Plugin☆14Mar 22, 2020Updated 5 years ago
- Malice Windows Defender AntiVirus Plugin☆40Mar 7, 2023Updated 2 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- Malice PExecutable Plugin☆16Mar 19, 2021Updated 4 years ago
- Malice File Info Plugin (libmagic, exiftool, TRiD and ssdeep)☆32Feb 11, 2024Updated 2 years ago
- ☆13May 24, 2023Updated 2 years ago
- Simple reverse shell to avoid Windows defender and kaspersky detection☆21Dec 20, 2021Updated 4 years ago
- ☆34Jul 28, 2018Updated 7 years ago
- Malice Yara Plugin☆30Sep 8, 2019Updated 6 years ago
- Malice AntiVirus Plugins☆118Nov 26, 2018Updated 7 years ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- Modern C++, range-based Mach-O parser designed for embedded use. Uses stack allocations only.☆34Oct 31, 2022Updated 3 years ago
- Some loader module for IDA☆35Feb 21, 2017Updated 9 years ago
- ☆34Aug 14, 2023Updated 2 years ago
- XML to a python dictionary☆11Sep 13, 2020Updated 5 years ago
- Keep track of a GSM device and show its location on a map☆11Apr 14, 2016Updated 9 years ago
- QRSS Plus: live QRSS grabbers from around the world☆10Feb 9, 2026Updated 2 weeks ago
- Presets for FxSound equalizer software for boosting sound quality, volume, and bass☆11Nov 19, 2025Updated 3 months ago
- Run TFLITE models on the web☆12Jan 2, 2022Updated 4 years ago
- A Go library speaking Hex-Rays IDA lumina protocol☆38Jun 15, 2023Updated 2 years ago
- ☆11Apr 18, 2022Updated 3 years ago
- IAT-Obfuscation to make static analysis of executable harder.☆44Sep 6, 2021Updated 4 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- Implement MTCNN with Tensorflow.js. A face detection framework with MTCNN and Tensorflow.js☆11Jun 30, 2022Updated 3 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- 基于gf框架的token验证插件☆11Sep 1, 2025Updated 6 months ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 4 months ago
- ☆15Oct 27, 2015Updated 10 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- Honeypot detection toolkit☆11Feb 10, 2026Updated 2 weeks ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- A no-code in-browser ML-Toolkit☆11Updated this week