PDFExaminer Tool - Analyse PDF Malware
☆63Aug 12, 2021Updated 4 years ago
Alternatives and similar repositories for pdfexaminer
Users that are interested in pdfexaminer are comparing it to the libraries listed below
Sorting:
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- QuickSand document and PDF malware analysis tool written in Python☆138Feb 16, 2026Updated 2 weeks ago
- Splunk app for visualization of DMARC RUA mails☆15Sep 26, 2025Updated 5 months ago
- Add-on for ingesting DMARC aggregate reports into Splunk☆15Dec 5, 2022Updated 3 years ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆42Feb 18, 2023Updated 3 years ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Repository for go shared libraries (for now).☆11Dec 1, 2025Updated 3 months ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Apr 9, 2022Updated 3 years ago
- ☆10Aug 17, 2024Updated last year
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- Unit frames that focus on simplicity and ease of use☆49Updated this week
- Automatically set traffic rules for Dynamic IP Addresses from a Dynamic DNS Domain☆12May 31, 2022Updated 3 years ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Provides a Learning Tools Interoperability (LTI) integration for creating WordPress blogs with appropriate user roles based on roles set …☆12Mar 17, 2025Updated 11 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- Script to output Azure IAM permissions and flag any explicit/owner permissions for review☆10May 18, 2020Updated 5 years ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Track your profession knowledge across your characters☆10Feb 28, 2026Updated last week
- A tool for parsing Blizzard Battle.net product.db on your system.☆11Feb 17, 2022Updated 4 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- SOAPI - The OpenAPI Documentation Scanner☆39Feb 17, 2025Updated last year
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- The Snapwell wellpath optimization tool☆11Dec 17, 2024Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated last year
- ☆11Jun 6, 2023Updated 2 years ago
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- Framework for creating custom servers☆10Feb 21, 2021Updated 5 years ago
- Go package with more powerful, flexible, and safe API for regular expressions based on lazy iterators☆15Apr 14, 2025Updated 10 months ago
- ☆12Feb 22, 2026Updated last week
- The great gaming migration to Linux☆24Dec 17, 2025Updated 2 months ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago