picatz / falconz
🦅 Falcon Malware Sandbox APIv2 Connector
☆29Updated 2 years ago
Alternatives and similar repositories for falconz:
Users that are interested in falconz are comparing it to the libraries listed below
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- A tool to triage screenshots☆19Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆18Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- ☆24Updated 6 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Yara syntax highlighting☆25Updated 3 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆29Updated 9 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆11Updated 10 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Basic file metadata gathering script☆21Updated this week
- Scripts for encoding files through DNS TXT records☆11Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago