RogueAssemblyHunter
Module scanner
A utility for discovering and identifying malicious .NET modules in running processes.
Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes.
115 stars
4 watching
10 forks
Language: C#
last commit: almost 3 years ago Related projects:
Repository | Description | Stars |
---|---|---|
sh1yo/x8 | Tools for discovering hidden parameters in web applications | 1,691 |
darkoperator/posh-virustotal | A PowerShell module for interacting with the VirusTotal API to analyze suspicious files and URLs. | 119 |
newrelic/rusty-hog | Secret scanner built in Rust for performance to detect sensitive information | 454 |
bugcrowd/hunt | An extension for Burp Suite that provides a structured approach to identifying and testing common vulnerability parameters. | 2,183 |
chvancooten/bugbountyscanner | A tool for automated vulnerability scanning and reconnaissance of websites for bug bounty opportunities | 874 |
codingo/reconnoitre | Automates reconnaissance and service enumeration of network hosts to gather information and write recommendations for further testing. | 2,110 |
fkie-cad/cwe_checker | Automated binary analysis tool to detect common software vulnerabilities | 1,134 |
portswigger/backslash-powered-scanner | An extension for Burp Suite that scans for unknown classes of injection vulnerabilities using a novel approach | 637 |
sud0woodo/dcomrade | Automates enumeration of vulnerable DCOM applications to aid in lateral movement and exploitation testing | 254 |
mandatoryprogrammer/xsshunter_client | An instrument used to hunt and identify cross-site scripting (XSS) vulnerabilities by tracking correlated requests and payloads. | 249 |
probablyclem/utoipauto | Automates addition of API documentation paths and schemas to Utoipa crate | 129 |
bojackthepillager/slackhound | Reconnaissance tool for Slack workspaces, allowing red teams to quickly search user profiles, files, and other objects. | 74 |
kevthehermit/pastehunter | Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,065 |
minamo7sen/burp-js-miner | Automates discovery of secrets and vulnerabilities in static web files | 54 |
ricardojba/poi-slinger | Automatically identifies serialization issues in PHP applications by forcing them to perform DNS lookups with serialized objects | 42 |