Giter Site home page Giter Site logo

methos2016's Projects

liset icon liset

Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident response (either forensic or malware oriented).

lookingglass icon lookingglass

Intuitive and configurable search interface for document archives.

luckystrike icon luckystrike

A PowerShell based utility for the creation of malicious Office macro documents.

macro_pack icon macro_pack

macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of MS Office documents, VB scripts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from vba generation to final document generation.

macroshop icon macroshop

Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.

makerbot_dual_caliper_calibrator icon makerbot_dual_caliper_calibrator

Caliper jig for Makerbot Dual that works with a knockoff Chinese caliper I had. Used to precisely level the HBP. May also work with other Makerbot models.

mal_sort icon mal_sort

Various scripts helpful in sorting collections of malware samples.

malware icon malware

Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.

malware-research icon malware-research

Code written as part of our various malware investigations http://www.welivesecurity.com/

malwaresandbox icon malwaresandbox

A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis

mavd icon mavd

Mobile Application Vulnerability Detection

metasploitable3 icon metasploitable3

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.

meterssh icon meterssh

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.

mimikatz icon mimikatz

A little tool to play with Windows security

mimipenguin icon mimipenguin

A tool to dump the login password from the current linux user

mirage-tcpip icon mirage-tcpip

TCP/IP networking stack in pure OCaml, using the Mirage platform libraries. Includes Ethernet, DHCP, ARP and TCP/IPv4 support.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.