montysecurity / InfraSpyderView external linksLinks
Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.
☆28Apr 22, 2023Updated 2 years ago
Alternatives and similar repositories for InfraSpyder
Users that are interested in InfraSpyder are comparing it to the libraries listed below
Sorting:
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 2 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 9 months ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Sep 6, 2022Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- ☆20Mar 21, 2024Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Aug 17, 2019Updated 6 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Oct 29, 2025Updated 3 months ago
- ☆27May 1, 2023Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Feb 8, 2022Updated 4 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- A dynamic unpacking tool☆145Sep 17, 2023Updated 2 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last week
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆89Dec 2, 2025Updated 2 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Dec 13, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Fetching data from system☆12Jun 18, 2017Updated 8 years ago
- JPCERT/CC public YARA rules repository☆110Nov 14, 2025Updated 3 months ago