sketchymoose / workslikeaJARMView external linksLinks
Method of finding interesting domains using keywords + JARMs
☆13Jan 30, 2023Updated 3 years ago
Alternatives and similar repositories for workslikeaJARM
Users that are interested in workslikeaJARM are comparing it to the libraries listed below
Sorting:
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 7 months ago
- Tool for scanning domains for .git directories.☆17Oct 2, 2023Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- ☆20Jan 9, 2024Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 2 years ago
- This repository contains tools used by 401trg.☆20Apr 14, 2021Updated 4 years ago
- Everything you need to prepare for the Microsoft 365 Certified: Endpoint Administrator Associate!☆25Dec 16, 2023Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- The report of a supervised classifier to detect malware in TLS traffic☆21Oct 21, 2019Updated 6 years ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 2 months ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- NoirGate provides on-demand ephemeral anonymous shells secured by TOTP☆34Apr 29, 2024Updated last year
- ☆22Jan 12, 2024Updated 2 years ago
- Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415☆27Oct 18, 2023Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 4 months ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Rust Weaponization for Red Team Engagements.☆28Nov 8, 2022Updated 3 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆42Jan 20, 2026Updated 3 weeks ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- IDA Python scripts☆40Apr 11, 2025Updated 10 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 5 months ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Apr 4, 2024Updated last year
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- A post-processing script for TinyTracer☆39Mar 22, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- Start here!☆11Feb 19, 2020Updated 5 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Aug 22, 2023Updated 2 years ago
- Retrieve AD accounts description and search for password in it☆82Jul 21, 2022Updated 3 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year