thechrisharrod / MalfindLinks
Powershell tool to download malware samples.
☆12Updated 9 years ago
Alternatives and similar repositories for Malfind
Users that are interested in Malfind are comparing it to the libraries listed below
Sorting:
- Various Malware-Related Utilities☆10Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- ☆16Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Static and automated/dynamic malware analysis☆47Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49Updated 8 years ago
- ☆27Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- See here:☆42Updated 13 years ago
- Why hunt when you can seine?☆21Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Updated 10 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Websocket based egress tester☆20Updated 9 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆11Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Updated 9 years ago
- The Swiss army knife of byte manipulation☆43Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- ☆46Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Updated 8 years ago
- Configuration security audit framework☆21Updated 9 years ago
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Updated 11 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- ☆50Updated 9 years ago