moval0x1 / NoDeleteView external linksLinks
NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.
☆49Nov 17, 2025Updated 2 months ago
Alternatives and similar repositories for NoDelete
Users that are interested in NoDelete are comparing it to the libraries listed below
Sorting:
- Examine Chrome extensions for security issues☆94Nov 16, 2025Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆69Oct 30, 2024Updated last year
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Feb 9, 2025Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated 11 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 8 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Dec 2, 2024Updated last year
- Linux CS bypass technique☆32Feb 4, 2025Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 2 weeks ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆36Jan 27, 2026Updated 2 weeks ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆59Oct 24, 2024Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 7 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆98Jan 25, 2026Updated 2 weeks ago
- Indirect Syscall with TartarusGate Approach in Go☆134Jul 8, 2025Updated 7 months ago
- ☆18Jan 31, 2025Updated last year
- Glass Cage is a zero-click PNG-based RCE chain in iOS 18.2.1, bypassing LockDown mode protection by exploiting ImageIO (CVE-2025-43300), …☆29Jan 11, 2026Updated last month
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 6 months ago
- Unauthenticated Remote Code Execution via Angular-Base64-Upload Library☆26Jul 12, 2025Updated 7 months ago
- A delicious, but malicious SSL-VPN server 🌮☆261Oct 2, 2025Updated 4 months ago
- Everything related to YARA☆16Sep 9, 2025Updated 5 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated last week
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 3 months ago
- Nameless C2 - A C2 with all its components written in Rust☆282Sep 26, 2024Updated last year
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆64Updated this week
- (MeetC2 a.k.a Meeting C2) - A framework abusing Google Calendar APIs.☆132Sep 4, 2025Updated 5 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Oct 7, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Nov 24, 2025Updated 2 months ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 10 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Aug 19, 2024Updated last year
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 7 months ago
- Slide of my conference presentations☆14Sep 5, 2024Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Python tool to check rootkits in Windows kernel☆207Aug 20, 2025Updated 5 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago