A scanner that files with compromised or untrusted code signing certificates written in python.
☆65Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for CertVerify
Users that are interested in CertVerify are comparing it to the libraries listed below
Sorting:
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- ☆30Jul 28, 2024Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆100Oct 27, 2024Updated last year
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆148Feb 1, 2026Updated last month
- VCL-based UI components for system tools that use NtUtilsLibrary☆21Updated this week
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- scscanner is tool to read website status code response from the lists.☆39May 27, 2023Updated 2 years ago
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- ☆25Aug 2, 2023Updated 2 years ago
- Neton is a tool for getting information from Internet connected sandboxes☆97Nov 15, 2022Updated 3 years ago
- Kernel Mode Driver for Elevating Process Privileges☆132Mar 23, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 2 years ago
- ☆61Oct 24, 2025Updated 4 months ago
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆144Jun 22, 2025Updated 8 months ago
- A super dope tool, that generates "corrupted" .PDF files of randomly unique file sizes (no two files of the same size or byte combination…☆14Oct 12, 2021Updated 4 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 7 months ago
- ☆23Jun 28, 2025Updated 8 months ago
- ☆13Mar 1, 2024Updated 2 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 8 months ago
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆191Feb 24, 2026Updated last week
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- An another JWT cracker but really fast!☆11Jan 26, 2023Updated 3 years ago
- Open source code for use with Hunchly.☆10May 28, 2018Updated 7 years ago
- ☆160Nov 26, 2023Updated 2 years ago
- Create your own certification authority with server certificates in a full automated way☆29Aug 29, 2025Updated 6 months ago
- This is a repo for fetching Applocker event log by parsing the win-event log☆31Aug 6, 2022Updated 3 years ago
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Static analysis tool based on clang, which detects source-to-binary information leaks in C and C++ projects☆87Oct 2, 2022Updated 3 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- Modular framework to exploit UPS devices☆64Mar 1, 2023Updated 3 years ago