Detect and prevent crypto malware as it encrypts files
☆69Nov 13, 2021Updated 4 years ago
Alternatives and similar repositories for cryptostalker
Users that are interested in cryptostalker are comparing it to the libraries listed below
Sorting:
- Naively estimate entropic probability☆38Nov 9, 2021Updated 4 years ago
- post-exploitation tools☆15Mar 27, 2018Updated 7 years ago
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 5 months ago
- Search hashes in different website.☆34Oct 3, 2020Updated 5 years ago
- Instagram bot that likes an object given an arbitrary tag.☆30Apr 13, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- ☆14Mar 31, 2015Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- Scan your online repo, check if it is missing the license (or install the Git Hooks in your machine)☆44Feb 26, 2026Updated last week
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Dec 8, 2015Updated 10 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Block pages hosted on censorship sites all around the world.☆14Oct 11, 2022Updated 3 years ago
- WhatsApp History to HTML converter☆15Nov 9, 2012Updated 13 years ago
- Gadget displacement on top of IPR (In-Place Randomization) against Code Reuse Attack☆26May 31, 2016Updated 9 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- ☆10Dec 13, 2016Updated 9 years ago
- ☆12Jan 28, 2026Updated last month
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- A new revolution in the Penetration Testing scene... for kali Linux☆14Feb 14, 2014Updated 12 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- OAuth plugin for Burp Suite Extender☆43Jun 27, 2018Updated 7 years ago
- automated-arancino is a lightweight analysis framework to automate malware experiments.☆16Apr 17, 2017Updated 8 years ago
- jnlpdownloader is a Python script that takes a URL to a JNLP and downloads all the associated JARs and native libraries. Another Java ba…☆14Aug 16, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago