Various Modules & Scripts for use with Viper Framework
☆27Aug 20, 2019Updated 6 years ago
Alternatives and similar repositories for viper-scripts
Users that are interested in viper-scripts are comparing it to the libraries listed below
Sorting:
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- ☆23Jul 7, 2020Updated 5 years ago
- Web application to visualize GreyNoise API data☆21Dec 4, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- Code generator for binary parsing☆19Feb 1, 2020Updated 6 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Run Powershell remotely from the CLI☆11May 1, 2016Updated 9 years ago
- ☆11Oct 3, 2019Updated 6 years ago
- Pollute phishing kits with fake credentials☆12Dec 17, 2021Updated 4 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated last week
- Filters that process and transform the output of osxcollector☆77Sep 6, 2019Updated 6 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- ☆28Jul 17, 2025Updated 7 months ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- X-Ways C# X-Tension API☆15May 28, 2013Updated 12 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Sep 26, 2016Updated 9 years ago
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago