Babyhamsta / MalcrowLinks
A Malware Scarecrow for Windows 10/11 with a user-friendly touch.
☆69Updated last year
Alternatives and similar repositories for Malcrow
Users that are interested in Malcrow are comparing it to the libraries listed below
Sorting:
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated 2 months ago
- Linux #rootkit and #malware revealer☆30Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆101Updated 11 months ago
- Baseline a Windows System against LOLBAS☆70Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆92Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 4 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 5 months ago
- PowerShell PE Parser☆62Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- Detonate malware on VMs and get logs & detection status☆76Updated last week
- A simple tool designed to create Atomic Red Team tests with ease.☆49Updated 10 months ago
- a tiny program to consume from ETW providers for research☆53Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆70Updated 2 weeks ago
- Rules shared by the community from 100 Days of YARA 2025☆38Updated 2 weeks ago
- Yara Rules for Modern Malware☆78Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 7 months ago
- ☆49Updated 11 months ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆53Updated 4 months ago
- A collection of my yara rules☆34Updated 2 years ago
- IOCs and notes related to malware☆26Updated 6 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆75Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 3 months ago
- Ludus range for the Constructing Defense Lab☆71Updated 2 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆34Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 6 months ago