swoops / video-game-save-file-trojans
Demonstrates why it's not safe to download random save files from the Internet
☆17Updated 2 years ago
Alternatives and similar repositories for video-game-save-file-trojans:
Users that are interested in video-game-save-file-trojans are comparing it to the libraries listed below
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated last year
- A C# Tool to gather information about email breaches☆13Updated last year
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆16Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 7 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 9 months ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆13Updated last year
- details about DIAL protocol vulnerabilities☆28Updated last year
- (CLI wrapper) Takes a list of URLs and retrieve screenshots of older versions stored on the Wayback Machine.☆36Updated 2 years ago
- Open YARA scan- and search engine☆20Updated last month
- Steganography-Like CLI / Web tool for concealing files within PNG images.☆8Updated last month
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 3 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- A tool to embed files into images☆12Updated 3 years ago
- Frida plugin for Binary Ninja☆17Updated 2 weeks ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- Monitor your target continuously for new subdomains!☆26Updated last year
- ☆16Updated 6 months ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Damn Vulnerable Browser Extension (DVBE), previously named as Badly Coded Browser Extension (BCBE), is an open-source vulnerable Chrome E…☆11Updated last month
- 🔗 A curated list of awesome Caido related projects☆35Updated 3 months ago
- ☆27Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Legba recipes.☆43Updated 5 months ago
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆11Updated 3 months ago