Code Monkey home page Code Monkey logo

Rahmi YILDIZ's Projects

maltrieve icon maltrieve

A tool to retrieve malware directly from the source for security researchers.

malware icon malware

Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools

malware-gems icon malware-gems

A not so awesome list of malware gems for aspiring malware analysts

malwareworld icon malwareworld

System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts

malwless icon malwless

Test Blue Team detections without running any attack.

malwoverview icon malwoverview

Malwoverview.py is a first response tool to perform an initial and quick triage in a directory containing malware samples, specific malware sample, suspect URL and domains. Additionally, it allows to download and send samples to main online sandboxes.

managedinjection icon managedinjection

A proof of concept for dynamically loading .net assemblies at runtime with only a minimal convention pre-knowledge

manati icon manati

A web-based tool to assist the work of the intuitive threat analysts.

masscan icon masscan

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

massdns icon massdns

A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration)

matire icon matire

Malware Analysis, Threat Intelligence and Reverse Engineering: LABS

megadev icon megadev

Bro IDS + ELK Stack to detect and block data exfiltration

meta-blue icon meta-blue

Meta-Blue is a powershell threat hunting tool with least frequency of occurence analysis in mind.

meterssh icon meterssh

MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relayed through the SSH tunnel and not through the network.

mimikittenz icon mimikittenz

A post-exploitation powershell tool for extracting juicy info from memory.

mimipenguin icon mimipenguin

A tool to dump the login password from the current linux user

mistica icon mistica

An open source swiss army knife for arbitrary communication over application protocols

mkyara icon mkyara

Generating YARA rules based on binary code

moddetective icon moddetective

modDetective is a small Python tool that chronologizes files based on modification time in order to investigate recent system activity.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.