quarkslab / irma-frontend
IRMA frontend
☆25Updated 8 years ago
Alternatives and similar repositories for irma-frontend:
Users that are interested in irma-frontend are comparing it to the libraries listed below
- IRMA ansible☆24Updated 8 years ago
- IRMA brain☆21Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- ☆27Updated 7 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- ☆20Updated 9 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- ☆15Updated 8 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19Updated 8 years ago
- DigitalOcean python tool utilising the API for creating and managing multiple customised droplets.☆10Updated 9 years ago
- YAPDNS☆39Updated 9 years ago
- Malware Analysis Zoo☆25Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- ☆30Updated 9 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago