malvuln / viruscredsLinks
Database of backdoor passwords used by Malware, uncovered by the Malvuln project.
☆25Updated last year
Alternatives and similar repositories for viruscreds
Users that are interested in viruscreds are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated 11 months ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- ☆25Updated 3 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 5 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- ☆42Updated 7 months ago
- ☆15Updated 3 years ago
- Open YARA scan- and search engine☆25Updated 8 months ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 11 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- ☆17Updated 9 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 11 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- wordlists for password cracking☆28Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 3 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- ☆80Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- ☆16Updated 6 months ago
- visually see issues with supported cipher suites☆17Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 9 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated last year
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆21Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- Standardizing Security Titles☆13Updated 2 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago