☆14Apr 29, 2020Updated 5 years ago
Alternatives and similar repositories for covid-cyber-response
Users that are interested in covid-cyber-response are comparing it to the libraries listed below
Sorting:
- Linux ortamına ait Anti-Analiz teknikleri uygulaması.☆10Aug 6, 2017Updated 8 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 6 months ago
- ☆12Jan 21, 2019Updated 7 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆32Aug 1, 2019Updated 6 years ago
- XSS Finder Tool☆13Aug 25, 2016Updated 9 years ago
- Bulk port checker written with Go☆19Apr 10, 2019Updated 6 years ago
- ☆57Mar 19, 2023Updated 2 years ago
- Slides that are used in the courses of AUCC☆20Oct 14, 2024Updated last year
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Documentation for ROCK NSM☆27Apr 7, 2021Updated 4 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28May 5, 2020Updated 5 years ago
- Active Directory Penetration Testing Tool☆29Nov 18, 2021Updated 4 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆28Aug 5, 2018Updated 7 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 5 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- Statically unpacking common android banker malware.☆160Apr 2, 2025Updated 11 months ago
- ☆20Jul 14, 2025Updated 7 months ago
- Kamusal veri kaynaklari ve bu verileri programatik olarak cekmek icin olusturulmus depo☆11Jan 4, 2021Updated 5 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Feb 28, 2022Updated 4 years ago
- X86_64 Assembly'a merhaba deyin!☆44Aug 17, 2019Updated 6 years ago
- Fetch Metadata server security middleware for Go☆11Oct 16, 2019Updated 6 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- One-click magic for Dart/Flutter export files in VSCode☆12Jan 31, 2024Updated 2 years ago
- Rust implementation of SafePOSIX☆13May 13, 2025Updated 9 months ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 10 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆17May 10, 2024Updated last year
- ASM Bootkit that patches DSE at boot allowing to load unsigned drivers☆15Aug 24, 2025Updated 6 months ago
- KPI Reporter is a dev-friendly, on-premises tool for crafting automated reports on what matters to you.☆10Oct 6, 2022Updated 3 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago