montysecurity / malware-bazaar-advanced-searchView external linksLinks
Script to chain search parameters for MalwareBazaar
☆12Jan 26, 2025Updated last year
Alternatives and similar repositories for malware-bazaar-advanced-search
Users that are interested in malware-bazaar-advanced-search are comparing it to the libraries listed below
Sorting:
- ☆11Jul 11, 2023Updated 2 years ago
- Windows 32/64-bit Include files and Import Libraries☆16May 26, 2022Updated 3 years ago
- really ?☆12Feb 29, 2024Updated last year
- ☆17Jan 12, 2025Updated last year
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- [IJCAI 2024] Imperio is an LLM-powered backdoor attack. It allows the adversary to issue language-guided instructions to control the vict…☆44Feb 18, 2025Updated 11 months ago
- ☆24Oct 18, 2022Updated 3 years ago
- An open source library for operating the Windows Overlay Filter driver.☆22Jan 16, 2019Updated 7 years ago
- Socks4 reverse proxy for penetration testing. Python 2 and 3 compatible.☆17Jul 1, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- This is a simple tool to dump all the reparse points on an NTFS volume.☆33Aug 20, 2020Updated 5 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated last year
- Copying multiple files using WinAPI IOCP☆20Aug 14, 2019Updated 6 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Jul 18, 2024Updated last year
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 7 months ago
- ☆30Jul 5, 2020Updated 5 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last week
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Apr 14, 2024Updated last year
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- ☆30Mar 21, 2023Updated 2 years ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆39Updated this week
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- 2019年天融信阿尔法实验室在微信公众号发布的所有安全资讯汇总☆35Jan 11, 2021Updated 5 years ago
- tunnel connections through HTTPS proxy☆28Sep 23, 2012Updated 13 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- ☆35Sep 13, 2022Updated 3 years ago
- T-Pot Attack Map that follows ES honeypot events within T-Pot and parses IPs, ports and honeypot info to visualize events in real time.☆49Dec 17, 2025Updated last month
- 「⚙️」Detect which native Windows API's (NtAPI) are being hooked☆39Dec 7, 2024Updated last year
- Load a dynamic library from memory by modifying the native Windows loader☆282Jun 18, 2025Updated 7 months ago