Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"
☆23Oct 9, 2025Updated 5 months ago
Alternatives and similar repositories for Malware-Analysis-Fundamentals-Workshop
Users that are interested in Malware-Analysis-Fundamentals-Workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Habit it is a habit tracker flutter project, built using clean architecture software techniques.☆12Feb 13, 2026Updated last month
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- ☆20Oct 16, 2024Updated last year
- Like DLP☆11Jan 27, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2013-4786 Go exploitation tool☆40Nov 18, 2025Updated 4 months ago
- ☆42May 20, 2021Updated 4 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Recon for Pentesting and BugBounty 🕵️☆14Jan 14, 2026Updated 2 months ago
- Get acquisitions by scraping titles of crunchbase.☆15Dec 18, 2024Updated last year
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Proxy Management for Security Professionals☆25Mar 25, 2025Updated last year
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- 👨🏼🏫 CTF education guide (In Russian). Курс молодого бойца CTF☆10Nov 11, 2018Updated 7 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- Mobile Session ID Extractor for TikTok☆16May 21, 2022Updated 3 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 9 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A collection of awesome one-liner scripts especially for bug bounty tips.☆15Sep 8, 2020Updated 5 years ago
- ☆18Mar 23, 2023Updated 3 years ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 8 months ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆33Sep 22, 2025Updated 6 months ago
- ☆13May 14, 2022Updated 3 years ago
- This repository is a curated resource for aspiring bug hunters, offering hands-on labs, tools, and structured guidance to support your le…☆75Jun 17, 2025Updated 9 months ago
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- 🚄 A powerful Railway Ticket Booking Portal built using React, Node, PostgreSQL. Using dynamic SQL techniques, stored procedures, trigger…☆19Jun 15, 2021Updated 4 years ago
- Code snippets for exploring malware techniques in C.☆16May 27, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repository contains tools made by completing exercises from various books on blackhat programming. The intent is to learn writing so…☆13Updated this week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆90Feb 14, 2024Updated 2 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- List of tools to use in the Advance Red Team Operations course from White Knight Labs☆14Dec 22, 2024Updated last year
- Command line interface for Sweech☆58May 2, 2019Updated 6 years ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆24Dec 1, 2024Updated last year