mattias-ohlsson / eicar-standard-antivirus-test-filesView external linksLinks
Test files for eicar-standard-antivirus-test-file
☆45Sep 6, 2024Updated last year
Alternatives and similar repositories for eicar-standard-antivirus-test-files
Users that are interested in eicar-standard-antivirus-test-files are comparing it to the libraries listed below
Sorting:
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Vulnerable Task Manager☆21Jan 14, 2025Updated last year
- Create a screenshot of a remote desktop because NLA is disabled.☆39Oct 30, 2021Updated 4 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- ☆28Jun 12, 2017Updated 8 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Simple SMB shares ACL scanner☆35Oct 31, 2018Updated 7 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Dec 29, 2016Updated 9 years ago
- Web shells for use in penetration testing☆41Mar 5, 2015Updated 10 years ago
- Uma ferramenta WEB de segurança open source de redes de computadores com Nmap, honeypot, vulnerabilidade de equipamentos de rede etc.☆10Mar 15, 2021Updated 4 years ago
- ☆13Mar 12, 2019Updated 6 years ago
- This ScriptPro 2.0 source code☆10Nov 12, 2013Updated 12 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Converts John The Ripper/Cain format hashes (singular, or in bulk) to HashCat compatible hash format.☆35Nov 24, 2019Updated 6 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Jun 11, 2024Updated last year
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆29Sep 21, 2017Updated 8 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- TEX for LaTeX. The template of documents in LaTeX in Russian☆10Aug 11, 2021Updated 4 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated last year
- Commons utility classes for quarkus based projects☆11Jan 15, 2026Updated last month
- A starter template for building Lynx applications with Tailwind CSS integration + Hot Reloading☆11Mar 30, 2025Updated 10 months ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 5 months ago
- ☆11May 30, 2021Updated 4 years ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- A document database emulator on top of Microsoft SQL Server XML columns☆11Mar 4, 2011Updated 14 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Sep 1, 2018Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Mar 20, 2017Updated 8 years ago
- .NET 4.0 Scheduled Job Lateral Movement☆90Aug 25, 2020Updated 5 years ago
- Social Engineering Toys☆37Feb 1, 2016Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Intune goodies☆10Dec 20, 2019Updated 6 years ago
- Nextcloud command-line client☆11Jan 27, 2026Updated 3 weeks ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago