thechrisharrod / Malfind
Powershell tool to download malware samples.
☆12Updated 9 years ago
Alternatives and similar repositories for Malfind:
Users that are interested in Malfind are comparing it to the libraries listed below
- A collection of tools mostly written in Python.☆15Updated 10 years ago
- Various Malware-Related Utilities☆10Updated 8 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Volatility Plugin to scan for shimmed processes in Windows☆10Updated 9 years ago
- Carve Windows Prefetch files from arbitrary binary data☆14Updated 7 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Exploit kit analyzer☆21Updated 10 years ago
- Why hunt when you can seine?☆21Updated 9 years ago
- Simple python script to detect meterpreter running in memory (hopefully)☆9Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆9Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 7 years ago
- ☆16Updated 10 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Updated 11 years ago
- Shared yara rules☆30Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12Updated 8 years ago
- ☆17Updated 7 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Updated 9 years ago
- Modern Honey Net set-up and configure scripts to automate multiple installs.☆8Updated 7 years ago
- Find permanent WMI event consumers on endpoints that could be used by APT actors.☆17Updated 8 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- An evolving hacking framework written in python☆11Updated 10 years ago