Fire-AV is a collection of lists that you can use to block av providers and bad ips
☆23May 3, 2026Updated this week
Alternatives and similar repositories for fire-av
Users that are interested in fire-av are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- JHACKULATOR is a jtagulator clone designed for cheap production and hand soldering☆16Oct 2, 2023Updated 2 years ago
- Pentest report writing guide☆19Apr 15, 2026Updated 2 weeks ago
- Attack chain emulator. Write recipes for initial access easily☆23Feb 26, 2025Updated last year
- Quick and dirty dynamic redirect.rules generator☆171Oct 12, 2022Updated 3 years ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Pentest report framework without data send☆19Sep 23, 2025Updated 7 months ago
- Automated Evilginx phishlet creator Extension for Burpsuite☆67Jan 10, 2025Updated last year
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Find Inbound Email Domains☆34Dec 21, 2023Updated 2 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆10Nov 28, 2024Updated last year
- This repository is made to create your own pentesting reports based on the following templates.☆27Feb 5, 2025Updated last year
- Notes Template/Checklist for PEN-300 OSEP☆17Nov 20, 2021Updated 4 years ago
- Excel parser for various pentesting tools.☆31Jun 13, 2023Updated 2 years ago
- Python3 HTTP Server with upload functionality☆22Dec 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Smart pentesting report template in LaTeX, with graphical CVSSv3 score representation.☆32Jul 24, 2024Updated last year
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 7 months ago
- Utilities for Pentesting with BloodHound☆23Apr 23, 2026Updated last week
- DLL injection with Microsoft detours☆23Dec 9, 2025Updated 4 months ago
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- ☆41Jan 10, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- RedTeam - Red Team Tools☆50Oct 30, 2022Updated 3 years ago
- A personal collection of scripts for decrypting various things.☆20Feb 20, 2023Updated 3 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Stage 0☆169Dec 18, 2024Updated last year
- A process injection technique using only thread context manipulation☆41Dec 18, 2023Updated 2 years ago
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation☆993Oct 7, 2022Updated 3 years ago
- VS Code inspired text editor that mostly runs in a webworker☆11Updated this week
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Feb 9, 2024Updated 2 years ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆513Mar 7, 2026Updated last month
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Notion C2 Profile for Mythic☆45Updated this week
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 7 months ago
- ☆12Feb 7, 2023Updated 3 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago