Azul is a malware repository for reverse engineers, incident responders and everyone in-between.
☆135Jan 19, 2026Updated 2 months ago
Alternatives and similar repositories for azul
Users that are interested in azul are comparing it to the libraries listed below
Sorting:
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆51Sep 22, 2025Updated 5 months ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated last month
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- ☆19Jul 14, 2025Updated 8 months ago
- Enhanced version of binaryninja-ollama and without using the ollama Python library☆13Jan 23, 2025Updated last year
- CSS injection requires an attacker to load a standalone CSS file to leak HTML tag attributes.☆21Apr 19, 2024Updated last year
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆15Mar 27, 2024Updated last year
- SafeCrypt is an academic ransomware simulation suite developed for Red Team engagements. It demonstrates modern malware techniques includ…☆33Oct 3, 2025Updated 5 months ago
- (Added Dark-GODMode)The Real BlackHat GPT - ai can do your illegal stuffs without saying anything. Use At Your Own Risk!☆63Feb 8, 2026Updated last month
- ☆21Sep 12, 2025Updated 6 months ago
- ☆10Oct 22, 2017Updated 8 years ago
- ☆16Jun 27, 2025Updated 8 months ago
- OASIS TC Open Repository: A GitHub public repository for development of a python library to transform between data-interchange formats (s…☆14Feb 10, 2022Updated 4 years ago
- ☆15Dec 7, 2022Updated 3 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Mar 12, 2026Updated last week
- A centralized list of the various Potato Windows exploits.☆21Dec 30, 2024Updated last year
- Self sustainable DOM content fuzzy hashing☆11Oct 5, 2024Updated last year
- MCP server for Google Drive, Docs, Sheets, Slides, Calendar, Gmail, and Contacts☆39Mar 11, 2026Updated last week
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- ☆53Mar 9, 2026Updated last week
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆65Feb 5, 2026Updated last month
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆42Aug 4, 2025Updated 7 months ago
- A tool for scanning for nearby devices running the Australian Government CovidSafe app☆16May 2, 2020Updated 5 years ago
- A Frida powered testing library designed to assist with security assesments of iOS applications written in Swift 5.☆17Apr 9, 2021Updated 4 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- 瞎越是一款 Burp Suite 的安全插件,主要用于测试 Web 越权、未授权的网络安全漏洞。☆11Jun 13, 2024Updated last year
- ☆19Jul 28, 2025Updated 7 months ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- Open source AVG solution for websites☆27Nov 7, 2018Updated 7 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- ThemeClipper - Generate theme clips from movies and series for jellyfin☆24Aug 31, 2025Updated 6 months ago
- Security Alert Decoration☆27Jul 21, 2025Updated 8 months ago
- The Data Analysis Pipeline☆17Apr 23, 2019Updated 6 years ago