☆36Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for CovenantDecryptor
Users that are interested in CovenantDecryptor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Writeups for CTF challenges☆35Mar 9, 2026Updated 2 weeks ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Mar 12, 2026Updated last week
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆42Apr 4, 2025Updated 11 months ago
- Advanced Tool To Scan And Exploit Local File Inclusion (LFI) Vulnerabilities☆36Jun 24, 2023Updated 2 years ago
- A malware scanner with Yara and ClamAV binding☆12Apr 16, 2025Updated 11 months ago
- The RedStack DB extracted as an Obsidian Vault☆42Dec 25, 2025Updated 2 months ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- ☆19Jan 12, 2024Updated 2 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated 11 months ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 6 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Data exfiltration and covert communication tool☆39Jan 10, 2023Updated 3 years ago
- ☆16Oct 18, 2024Updated last year
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Python bindings for https://github.com/omerbenamram/mft☆23Dec 23, 2025Updated 3 months ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Resources Links for the Research Based on Josh Prager and Nico Shyne's☆13Oct 21, 2024Updated last year
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- A code skeleton of Samsung's Shannon5123 5G baseband modem.☆20May 6, 2020Updated 5 years ago
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Zimbra - Remote Command Execution (CVE-2024-45519)☆134Apr 6, 2025Updated 11 months ago
- Collection of my volatility3 plugins☆18Sep 6, 2024Updated last year
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26☆10Aug 28, 2024Updated last year
- Yee ennoy☆12Nov 21, 2023Updated 2 years ago
- a p2p socket proxy based on toxcore☆12Jun 7, 2016Updated 9 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- BSentry is a comprehensive collection of additional security checks designed to enhance your Burp Suite experience.☆12Aug 16, 2024Updated last year
- ☆10Jun 19, 2024Updated last year
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago