☆10Feb 20, 2026Updated 3 weeks ago
Alternatives and similar repositories for Malware_Analysis
Users that are interested in Malware_Analysis are comparing it to the libraries listed below
Sorting:
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- 📚 Sistema de gerenciamento de estoque desenvolvido como projeto acadêmico. Permite cadastrar produtos, controlar entradas e saídas, acom…☆15Nov 6, 2025Updated 4 months ago
- ☆49Jan 14, 2025Updated last year
- ☆23Oct 28, 2024Updated last year
- ☆17Jun 25, 2025Updated 8 months ago
- SWAT - System-Wide Analysis Toolkit☆16Oct 4, 2021Updated 4 years ago
- Config files for my GitHub profile.☆18Apr 18, 2025Updated 11 months ago
- Pioneering Real-time Market Pulse Synthesizer for Scalable, High-Availability Trading Nexus. providing enterprise-grade PriceOracle solut…☆13Aug 2, 2025Updated 7 months ago
- Simple C++ Reverse Shell☆13Nov 22, 2022Updated 3 years ago
- ☆10Updated this week
- Professional TestingPlatform framework with TestingPlatform-optimized cloud-ready and enterprise scalable-architecture capabilities☆16Aug 3, 2025Updated 7 months ago
- Professional AntoraUi framework with AntoraUi-optimized intelligent-automation and enterprise antoraui-optimization capabilities☆23Aug 6, 2025Updated 7 months ago
- github-unfollower: 🕵️ Detect GitHub users who don’t follow you back and those you don’t follow back. ⚡ Supports accounts with +6,000 con…☆15Jul 26, 2025Updated 7 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A small wifi penetration testing tool-kit☆11Jul 21, 2023Updated 2 years ago
- Config files for my GitHub profile.☆26Updated this week
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Fractured-feed Ingestion Framework for Real-time Risk Surveillance and Tick-level Insight Optimizer featuring historical-data-replay capa…☆17Aug 2, 2025Updated 7 months ago
- Next-generation effect engine for autonomous, scalable, and intelligent real-time rendering and simulation pipelines☆12Aug 3, 2025Updated 7 months ago
- Chess WebApp Single Player is a feature-rich chess application featuring real-time clocks, selectable ELO-based AI difficulty (using Stoc…☆14Jun 12, 2025Updated 9 months ago
- 🟩⬜ Generates a snake game from a github user contributions graph and output a screen capture as animated svg or gif☆16Updated this week
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆39May 20, 2024Updated last year
- Enderman's GitHub profile☆34Mar 13, 2025Updated last year
- A Github tool that automates GitHub pull requests, issues, and code reviews across multiple accounts to simulate real-world collaboration…☆18Jan 13, 2026Updated 2 months ago
- Test task (2022). A pizza delivery prototype with bicycle controls, inverse kinematics, and simple street traffic interactions.☆18Sep 20, 2025Updated 6 months ago
- Unity -> CI -> GithAction☆12May 5, 2025Updated 10 months ago
- ☆27Sep 17, 2025Updated 6 months ago
- Trojan (Ransomware) Phishing Simulator for Cybersecurity Training.☆33Nov 6, 2025Updated 4 months ago
- Pinger is a tool to ping the ip addresses in files such as excel or csv to show if the hosts are turned on.☆12Feb 9, 2020Updated 6 years ago
- ☆24Oct 13, 2025Updated 5 months ago
- Professional ConversationalAI system with ConversationalAI-optimized modern-design and enterprise enterprise-grade capabilities☆24Aug 10, 2025Updated 7 months ago
- Python'un scapy modülü kullanılarak aynı ağda bulunan cihazların ip ve mac adreslerini listeyen script.☆11Jun 24, 2020Updated 5 years ago
- ☆15Oct 30, 2024Updated last year
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- Python ejemplos de software, codigos basicos, uso de librerias y codigos relacionados a la Ciberseguridad. Codigo python, Python codes, …☆19Mar 8, 2026Updated last week
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 6 months ago