sakkiii / MultiAV2Links
MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
☆73Updated last year
Alternatives and similar repositories for MultiAV2
Users that are interested in MultiAV2 are comparing it to the libraries listed below
Sorting:
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated 2 weeks ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- AdHoc solutions☆48Updated 2 years ago
- (kinda) Malicious Outlook Reader☆138Updated 4 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 3 years ago
- My Malware Analysis Reports☆25Updated 3 years ago
- ProcDot Malware Sandbox☆26Updated 6 months ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- Specialized tool to dump Position Independent Code.☆22Updated 5 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Updated 3 years ago
- Triaging Windows event logs based on SANS Poster☆44Updated 2 months ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Updated last year
- Just a PoC to turn xlsx (regular Excel files) into xlsm (Excel file with macro) and slipping inside a macro (vbaProject.bin)☆145Updated 4 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- pypykatz plugin for volatility3 framework☆46Updated 8 months ago
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆69Updated 3 years ago
- Lazarus analysis tools and research report☆57Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- ☆66Updated 2 years ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago