Javascript deobfuscation tool
☆17Apr 6, 2018Updated 7 years ago
Alternatives and similar repositories for honeybadger
Users that are interested in honeybadger are comparing it to the libraries listed below
Sorting:
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- ☆18May 16, 2013Updated 12 years ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- ☆28Dec 7, 2016Updated 9 years ago
- GigaDrop allows you to easily and securely share files directly between devices without uploading them to any server first☆11Sep 4, 2022Updated 3 years ago
- lua scripts for dota2☆10Jul 28, 2019Updated 6 years ago
- splunk alert script to create resilient tickets☆10Jun 8, 2016Updated 9 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆127Sep 23, 2023Updated 2 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- A phishing detect system with NLP/OCR/HTML features☆11Apr 2, 2018Updated 7 years ago
- Script to install pentest tools on Alpine Linux☆12Jul 3, 2015Updated 10 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- A very basic app written in Javascript and packaged as a Docker image to be used as a demo when testing clustered deployments in ECS/EKS.☆11Jun 30, 2023Updated 2 years ago
- Mahjong solitaire as a browser game☆14Jan 26, 2024Updated 2 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 5 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 5 years ago
- [Checker Emails Twitter + Login API Twitter] - API REST Twitter☆10Aug 18, 2018Updated 7 years ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Hash/time based protection for download links☆20Aug 7, 2011Updated 14 years ago
- A script to access someone's webcam by sharing a link.☆10May 3, 2020Updated 5 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 2 years ago
- Web DB Viewer. Portable web application to see database☆22Oct 24, 2019Updated 6 years ago
- Another Instagram Bot☆12Jan 21, 2018Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- kNOwlock is a tool to get lockscreen passcode of any windows, android or iPhone device.☆13May 3, 2020Updated 5 years ago
- A no-code in-browser ML-Toolkit☆11Updated this week
- Pixano website☆10Apr 7, 2022Updated 3 years ago
- Face2Faceの実装とか☆13Jun 11, 2016Updated 9 years ago
- ☆11Sep 1, 2022Updated 3 years ago
- Diskmag engine Deus ex Machina (DOS, Windows, smooth scrolling from CGA to SVGA)☆13Nov 11, 2015Updated 10 years ago
- a golang implementation of gauntlt☆12Oct 25, 2018Updated 7 years ago
- ☆10Jun 30, 2016Updated 9 years ago
- Simple and straight forward interfaces to the various shipping web services☆10Apr 20, 2012Updated 13 years ago