A security tool for detecting suspicious PDF modifications commonly found in BEC
☆41Aug 4, 2016Updated 9 years ago
Alternatives and similar repositories for pdfxpose
Users that are interested in pdfxpose are comparing it to the libraries listed below
Sorting:
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- Dragon Sandbox☆81Apr 1, 2013Updated 12 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- a network packet capture compiler☆205Apr 28, 2022Updated 3 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- ☆22Apr 10, 2020Updated 5 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- CloudEvents Transformation engine☆10Oct 12, 2021Updated 4 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- An updated version of the cryptolocked (anti-ransomware) toolkit. Adds new features such as the hunter module.☆11Mar 29, 2017Updated 8 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Example packet.proxy plugins.☆22Jan 8, 2021Updated 5 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- ☆16May 9, 2016Updated 9 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- ☆85May 19, 2015Updated 10 years ago
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- 📖 A repo of configuration examples for StackHawk's Hawkscan!☆18Jan 28, 2026Updated last month
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- [DEPRECATED] Omnibus package for Graylog☆13Apr 26, 2019Updated 6 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 6 years ago