DVCS-Pillage

Repo Extractor

Automates extraction of code and configuration data from inaccessible Git, Mercurial, and Bazaar repositories by analyzing file names and object hashes.

Pillage web accessible GIT, HG and BZR repositories

GitHub

314 stars
16 watching
60 forks
Language: Shell
last commit: almost 8 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
kost/dvcs-ripper A tool for extracting and ripping version control systems from web-accessible repositories. 1,709
kevoreilly/capev2 A tool to extract configuration and payload from malware by analyzing its behavior in a sandboxed environment. 2,026
mdudek-ics/trisis-triton-hatman Repository containing malware samples and decompiled code to aid in security research and development of defense solutions 231
nccgroup/go-pillage-registries Tool to scan and pull images from a Docker registry 104
advanced-threat-research/darkside-config-extract Extracts configuration data from ransomware binaries 33
detuxsandbox/detux Analyzes and captures malware traffic on Linux sandboxed environments using QEMU hypervisor and various CPU architectures. 260
emo-crab/scap-rs A collection of Rust libraries for working with vulnerability data from various sources. 16
malfrats/xeuledoc A tool to fetch information about public Google documents from various services 852
acsdavid97/dotnethooker Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware. 5
idiom/pftriage Tool to analyze files during malware analysis and triage by extracting properties and detecting malicious indicators. 77
jpcertcc/malconfscan Tools to extract configuration data from known malware samples in memory images. 485
hightechsec/git-scanner Tools for identifying and scanning public Git repositories for security vulnerabilities 340
appsecco/dvna A tool to demonstrate common vulnerabilities in web applications and provide guidance on fixing them. 707
scumjr/dirtycow-vdso A Proof-of-Concept for exploiting a vulnerability in the Linux vDSO, allowing arbitrary code execution. 491
jstrosch/malware-samples Provides access to malicious files and malware analysis resources 1,483