password123456 / malwarescannerLinks
Simple Malware Scanner written in python
☆91Updated 3 weeks ago
Alternatives and similar repositories for malwarescanner
Users that are interested in malwarescanner are comparing it to the libraries listed below
Sorting:
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆49Updated 4 years ago
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- BackdoorSim: An Educational into Remote Administration Tools☆103Updated last year
- ☆132Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆117Updated last year
- FCracker is a command line tool designed to brute force encrypted files like zip, 7z, rar, pdf etc.☆37Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 11 months ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆94Updated 10 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 7 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆79Updated 4 months ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆46Updated last year
- An Interface for AI built for cybersecurity professionals☆91Updated 3 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆72Updated last week
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆38Updated 7 months ago
- A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. Non…☆63Updated 4 months ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆77Updated 3 years ago
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆67Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago