sakkiii / MultiAV2Links
MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
☆72Updated last year
Alternatives and similar repositories for MultiAV2
Users that are interested in MultiAV2 are comparing it to the libraries listed below
Sorting:
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Updated 4 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆177Updated last week
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- My Malware Analysis Reports☆24Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆53Updated last year
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- ProcDot Malware Sandbox☆26Updated 5 months ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆43Updated 4 years ago
- AdHoc solutions☆48Updated 2 years ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 3 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- Quickly search for references to a GUID in DLLs, EXEs, and drivers☆75Updated 4 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Updated 3 years ago
- The repository accompanying the Buer Emulation workshop☆23Updated 4 years ago
- (kinda) Malicious Outlook Reader☆137Updated 4 years ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆40Updated 2 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Updated 2 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Updated 2 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 3 years ago