silascutler / DetuxNGView external linksLinks
The Multiplatform Linux Sandbox
☆16Dec 19, 2023Updated 2 years ago
Alternatives and similar repositories for DetuxNG
Users that are interested in DetuxNG are comparing it to the libraries listed below
Sorting:
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 10 months ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 10 months ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 5 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- Vuls Beater for Elasticsearch - connecting vuls☆17Dec 15, 2020Updated 5 years ago
- Kali Linux Network Scanning Cookbook Second Edition, published by Packt☆17Dec 15, 2020Updated 5 years ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- ☆22May 24, 2024Updated last year
- ☆21Jul 27, 2020Updated 5 years ago
- Malware sample exchange system and API intended for Anti-Virus companies and researchers.☆16Aug 19, 2024Updated last year
- ☆17Sep 3, 2015Updated 10 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- OLE Package Format Documentation☆22Jun 13, 2020Updated 5 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- ☆16Apr 30, 2024Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago