The Multiplatform Linux Sandbox
☆16Dec 19, 2023Updated 2 years ago
Alternatives and similar repositories for DetuxNG
Users that are interested in DetuxNG are comparing it to the libraries listed below
Sorting:
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 10 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Word split utility☆13Jun 21, 2018Updated 7 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 2 years ago
- A modular Karton Framework service that unpacks common packers like UPX and others using the Qiling Framework.☆58May 24, 2021Updated 4 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- Vuls Beater for Elasticsearch - connecting vuls☆17Dec 15, 2020Updated 5 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- Kali Linux Network Scanning Cookbook Second Edition, published by Packt☆18Dec 15, 2020Updated 5 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- ☆17Feb 15, 2022Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- ☆19Jul 21, 2022Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Nov 25, 2023Updated 2 years ago
- ☆21Jul 27, 2020Updated 5 years ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- ☆17Sep 3, 2015Updated 10 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- ☆22May 24, 2024Updated last year
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆24Jan 6, 2023Updated 3 years ago
- ☆16Apr 30, 2024Updated last year
- Extract annoations from Ghidra into an X32/X64 dbg database☆57Feb 24, 2021Updated 5 years ago