Skip to content
View exorcistas's full-sized avatar
🐺
if I sleep... who will bring me the moon?
🐺
if I sleep... who will bring me the moon?
Block or Report

Block or report exorcistas

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Beta Lists are currently in beta. Share feedback and report bugs.
132 results for source starred repositories
Clear filter

Repository resource threat intelligence for SOC

9 6 Updated Sep 14, 2018

Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus products, collecting malware for another analyzer/zoo.

Python 91 25 Updated Aug 7, 2015

Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do

C 3,276 455 Updated Jun 21, 2024

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

C++ 5,734 1,158 Updated Mar 18, 2024

A collection of awesome web crawler,spider in different languages

6,317 684 Updated Jun 16, 2024

An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.

Python 35,581 3,968 Updated Aug 15, 2024

Custom Selenium Chromedriver | Zero-Config | Passes ALL bot mitigation systems (like Distil / Imperva/ Datadadome / CloudFlare IUAM)

Python 9,366 1,110 Updated Jun 25, 2024

12 Weeks, 24 Lessons, AI for All!

Jupyter Notebook 33,672 5,572 Updated Aug 13, 2024

An open-source, low-code machine learning library in Python

Jupyter Notebook 8,755 1,750 Updated Aug 13, 2024

Capstone disassembly/disassembler framework for ARM, ARM64 (ARMv8), Alpha, BPF, Ethereum VM, HPPA, LoongArch, M68K, M680X, Mips, MOS65XX, PPC, RISC-V(rv32G/rv64G), SH, Sparc, SystemZ, TMS320C64X, T…

C 7,261 1,534 Updated Aug 15, 2024

Malicious traffic detection system

Python 6,225 1,054 Updated Aug 15, 2024

Password lists with top passwords to optimize bruteforce attacks

302 53 Updated Jun 3, 2024

Passively scan for Bluetooth Low Energy devices and attempt to fingerprint them

Python 142 40 Updated Jul 4, 2023

Divide full port scan results and use it for targeted Nmap runs

Python 304 48 Updated Jul 1, 2024

My vagrantfile for building a malware/memory analysis platform.

Python 5 2 Updated Jul 26, 2024

Builds malware analysis Windows VMs so that you don't have to.

Python 1,028 137 Updated Aug 23, 2021

Malware Configuration And Payload Extraction

Python 1,835 398 Updated Aug 14, 2024

Collection of malware source code for a variety of platforms in an array of different programming languages.

Assembly 15,499 1,724 Updated Jul 10, 2024

Please no pull requests for this repository. Thanks!

Python 1,926 512 Updated Jul 13, 2024

Python snippets for Ghidra's Program and Decompiler APIs

718 60 Updated Jul 19, 2023

Examples of malware's anti- techniques for Windows x86 architecture. Keywords: Windows, Malware, x86, anti-debugging, anti-VM, sandbox detection

C++ 8 Updated Apr 20, 2022

Cross-platform GUI written in Rust using ADB to debloat non-rooted android devices. Improve your privacy, the security and battery life of your device.

Rust 15,017 806 Updated Aug 2, 2024

An Office365 User Attack Tool

Go 618 98 Updated Mar 19, 2024

Scripted Local Linux Enumeration & Privilege Escalation Checks

Shell 6,888 1,980 Updated Sep 6, 2023

Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.

2,552 164 Updated Oct 27, 2021

Repeatable, movable and isolated Python environments for your automation. 🚀

Go 447 90 Updated Aug 7, 2024

Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.

164 59 Updated Dec 30, 2019

Resources about network security, including: Proxy/GFW/ReverseProxy/Tunnel/VPN/Tor/I2P, and MiTM/PortKnocking/NetworkSniff/NetworkAnalysis/etc。More than 1700 open source tools for now. Post incoming.

862 173 Updated Dec 30, 2019

Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.

606 111 Updated Dec 31, 2019
Next