netwrkspider / malwareSample
This repo generally for malware Researcher ("Password: infected")
☆19Updated last year
Alternatives and similar repositories for malwareSample:
Users that are interested in malwareSample are comparing it to the libraries listed below
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- ProcDot Malware Sandbox☆22Updated 3 months ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Ransomware Decryptors☆34Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 5 years ago
- all published scripts devloped by ahmed khlief☆20Updated 4 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 9 months ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Tweettioc Splunk App☆20Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 3 years ago
- Searching .evtx logs for remote connections☆23Updated last year
- ☆50Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- ☆17Updated 3 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Apfell implant written in C#.☆8Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆19Updated 2 years ago