Pinned Repositories
actaeon
Memory forensics of virtualization environments
al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
ANSE-SCANNER
API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
eland
Python Client and Toolkit for DataFrames, Big Data, Machine Learning and ETL in Elasticsearch
elastiflow
Network flow Monitoring (Netflow, sFlow and IPFIX) with the Elastic Stack
gdog
A fully featured Windows backdoor that uses Gmail as a C&C server
incubator-spot
Mirror of Apache Spot
phpwebsite
phpwebsite
Wazuh-Demos
Repo Filled With Follow Along Guides
arunsigood's Repositories
arunsigood/al-khaser
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
arunsigood/API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
arunsigood/avatar2
Python core of avatar²
arunsigood/BlockChain-Security-List
arunsigood/cve-search
cve-search - a tool to perform local searches for known vulnerabilities
arunsigood/exodus
Painless relocation of Linux binaries–and all of their dependencies–without containers.
arunsigood/fitness-firmware
arunsigood/Inject-dll-by-APC
Asynchronous Procedure Calls
arunsigood/jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
arunsigood/koadic
Koadic C3 COM Command & Control - JScript RAT
arunsigood/lava
LAVA: Large-scale Automated Vulnerability Addition
arunsigood/logparser
A toolkit for automated log parsing
arunsigood/maltrail
Malicious traffic detection system
arunsigood/metta
An information security preparedness tool to do adversarial simulation.
arunsigood/mona
Corelan Repository for mona.py
arunsigood/ndss18_wycinwyc
arunsigood/NeuroNER
Named-entity recognition using neural networks. Easy-to-use and state-of-the-art results.
arunsigood/nexmon
The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more
arunsigood/nforceit_IoT
This programm is used to auto discover vulnerabilities from extracted IoT device firmware
arunsigood/Noriben
Noriben - Portable, Simple, Malware Analysis Sandbox
arunsigood/passivedns
A network sniffer that logs all DNS server replies for use in a passive DNS setup
arunsigood/PRET
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
arunsigood/pycs
Python Based ARM CoreSight Debug and Trace Tools
arunsigood/pyrebox
Python scriptable Reverse Engineering Sandbox, a Virtual Machine instrumentation and inspection framework based on QEMU
arunsigood/python-telegram-bot
We have made you a wrapper you can't refuse
arunsigood/sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
arunsigood/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
arunsigood/weirdAAL
WeirdAAL (AWS Attack Library)
arunsigood/Windows-Secure-Host-Baseline
Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. #nsacyber
arunsigood/Zeratool
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems