[BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack
☆107Jan 6, 2023Updated 3 years ago
Alternatives and similar repositories for ektotal
Users that are interested in ektotal are comparing it to the libraries listed below
Sorting:
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 7 years ago
- Tool for introspection of SSL\TLS sessions☆142Jan 26, 2026Updated last month
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- ☆137Mar 20, 2019Updated 6 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆209Nov 16, 2018Updated 7 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 7 months ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Open Source Threat Intelligence Chat Bot☆322Mar 30, 2020Updated 5 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 10 months ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆425Feb 23, 2026Updated last week
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Aug 1, 2021Updated 4 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 3 months ago
- An Android app that lets you use your access control card cloning devices in the field.☆484Jul 27, 2019Updated 6 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams wr…☆447Oct 28, 2022Updated 3 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- VirusTotal Wanna Be - Now with 100% more Hipster☆1,855Apr 3, 2023Updated 2 years ago
- A Microservices-based framework for the study of Network Security and Penetration Test techniques☆629Jun 17, 2025Updated 8 months ago
- Graphical Realism Framework for Industrial Control Simulations☆225Jun 20, 2024Updated last year
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- Your Swiss Army knife to analyze malicious web traffic based on the popular Fiddler web debugger.☆644Nov 27, 2024Updated last year
- DECAF (short for Dynamic Executable Code Analysis Framework) is a binary analysis platform based on QEMU. This is also the home of the D…☆837Nov 19, 2024Updated last year
- Community-based integrated malware identification system☆81Dec 10, 2022Updated 3 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Lepus-CTF frontend application☆11Nov 2, 2015Updated 10 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- ViewState Payload Generator☆26Aug 17, 2018Updated 7 years ago