A security tool for detecting suspicious PDF modifications commonly found in BEC
☆41Aug 4, 2016Updated 9 years ago
Alternatives and similar repositories for pdfxpose
Users that are interested in pdfxpose are comparing it to the libraries listed below
Sorting:
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- ☆22Apr 10, 2020Updated 5 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- a network packet capture compiler☆205Apr 28, 2022Updated 3 years ago
- Independent file type identification python library☆12Mar 16, 2023Updated 3 years ago
- ☆84May 19, 2015Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- VMware Snapshot Forensic Comparison Scripts☆25Mar 19, 2013Updated 13 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- Dragon Sandbox☆82Apr 1, 2013Updated 12 years ago
- A basic example of how to use Least Significant Bit steganography on a BMP image☆15Mar 16, 2023Updated 3 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- A tool for deploying and detecting use of Active Directory honeytokens☆509Jul 13, 2022Updated 3 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- encoding format, library, and utilities for passive DNS data☆27Mar 29, 2024Updated last year
- Normalizer for honeypot data.☆11Dec 6, 2023Updated 2 years ago
- Install script for grsecurity for Debian environments☆60Nov 30, 2015Updated 10 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 4 years ago
- A Python 2.x library for asynchronous tasks☆13May 8, 2019Updated 6 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago