Laosheng.top老生常谈,节约您的搜寻时间。Laosheng.top 中国新闻云媒体,中央外宣与一带一路云媒体,五大洲的报纸、电视、通讯社;The Belt and Road Cloud Media。 解放军微博阵列,明星微博粉丝榜。中央有关部门大全,政府政协人大两院。中国千县地名图,联合国有关部门。 大萌望海楼,找法不用愁。中国法律体系概览,大萌法律读本。 老生常谈排行榜,难搜到的好网站。LSIP 大规模集成网页。😤
Stars: ✭ 21 (-30%)
mkpolyA simple polymorphic engine
Stars: ✭ 28 (-6.67%)
threadsTHREADS Conference Archive
Stars: ✭ 17 (-43.33%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+836.67%)
r2yarar2yara - Module for Yara using radare2 information
Stars: ✭ 30 (+0%)
urteile-gesetze-webWeb-Frontend des juristischen Informationssystems urteile-gesetze.de
Stars: ✭ 16 (-46.67%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+916.67%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+473.33%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (+6.67%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (+26.67%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+240%)
ScrummageThe Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (+1083.33%)
Kernel-dll-injectorKernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (+753.33%)
VX-APICollection of various malicious functionality to aid in malware development
Stars: ✭ 904 (+2913.33%)
ArminC-uBlock-Settings⚙️ ArminC's settings for uBlock₀ - remove most of the ads, pop-ups and trackers.
Stars: ✭ 24 (-20%)
rhinoAgile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (+63.33%)
Ai lawall kinds of baseline models for long text classificaiton( text categorization)
Stars: ✭ 243 (+710%)
Tax CalculatorUSA Federal Individual Income and Payroll Tax Microsimulation Model
Stars: ✭ 186 (+520%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+213.33%)
UnpackersMy collection of unpackers for malware packers/crypters
Stars: ✭ 25 (-16.67%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (+56.67%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+50%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (-10%)
CapstoneCAP database scripts.
Stars: ✭ 112 (+273.33%)
Learning-ResourcesThis repository contains curated, useful resources drafted by DSC Domain Leads.
Stars: ✭ 21 (-30%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-10%)
LicenseeA Ruby Gem to detect under what license a project is distributed.
Stars: ✭ 476 (+1486.67%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (+23.33%)
Tosdr.orgARCHIVED Source code for tosdr.org
Stars: ✭ 460 (+1433.33%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+266.67%)
constitucion-mexicanaConstitución Política de los Estados Unidos Mexicanos en formato ReST
Stars: ✭ 47 (+56.67%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+290%)
Runpe In MemoryRun a Exe File (PE Module) in memory (like an Application Loader)
Stars: ✭ 249 (+730%)
peneworkPenetration Test Framwork
Stars: ✭ 24 (-20%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (+740%)
sarlaccSMTP server / sinkhole for collecting spam
Stars: ✭ 42 (+40%)
Malware SamplesMalware samples, analysis exercises and other interesting resources.
Stars: ✭ 241 (+703.33%)
ElfparserCross Platform ELF analysis
Stars: ✭ 228 (+660%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+136.67%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+890%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (+626.67%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (+410%)
BotnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+8310%)
QuiescisQuescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (+86.67%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-40%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+103.33%)
esajScrapers for many e-SAJ systems
Stars: ✭ 35 (+16.67%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+236.67%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (+83.33%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (+30%)