sakkiii / MultiAV2Links
MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling
☆73Updated last year
Alternatives and similar repositories for MultiAV2
Users that are interested in MultiAV2 are comparing it to the libraries listed below
Sorting:
- MultiAV scanner with Python and JSON REST API using Malice Docker AV Containers and Docker-Machine based Autoscaling☆22Updated 4 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Updated 2 weeks ago
- Finding secrets in kernel and user memory☆116Updated 2 years ago
- Harvis is designed to automate your C2 Infrastructure.☆107Updated 3 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆133Updated 3 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 5 years ago
- Yapscan is a YAra based Process SCANner, aimed at giving more control about what to scan and giving detailed reports on matches.☆62Updated 2 years ago
- (kinda) Malicious Outlook Reader☆138Updated 4 years ago
- Lazarus analysis tools and research report☆57Updated 2 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated 2 years ago
- Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.☆117Updated 4 years ago
- Petaq - Purple Team Command & Control Server☆105Updated 3 years ago
- AdHoc solutions☆48Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆185Updated 7 months ago
- ProcDot Malware Sandbox☆26Updated 6 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- ☆66Updated 2 years ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Updated 4 years ago
- My Malware Analysis Reports☆25Updated 3 years ago
- Linux startup analyzer☆66Updated 8 months ago
- Just another useless C2 occupying space in some HDD somewhere.☆21Updated 2 years ago
- Simple EDR implementation to demonstrate bypass☆181Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Updated 2 years ago
- Userland API monitor for threat hunting☆58Updated 5 years ago