Babyhamsta / MalcrowLinks
A Malware Scarecrow for Windows 10/11 with a user-friendly touch.
☆66Updated last year
Alternatives and similar repositories for Malcrow
Users that are interested in Malcrow are comparing it to the libraries listed below
Sorting:
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Updated last month
- Linux #rootkit and #malware revealer☆30Updated last year
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆91Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 5 months ago
- Baseline a Windows System against LOLBAS☆69Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆73Updated 2 weeks ago
- PowerShell PE Parser☆62Updated last year
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆37Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆37Updated 11 months ago
- Microsoft Vulnerable Driver Block Lists in CSV and JSON for SIEM lookups☆53Updated 3 months ago
- A collection of my yara rules☆34Updated 2 years ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆102Updated 10 months ago
- ☆49Updated 10 months ago
- a tiny program to consume from ETW providers for research☆53Updated 11 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127Updated last year
- ☆181Updated 8 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 6 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- Detonate malware on VMs and get logs & detection status☆73Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- C2 Active Scanner☆60Updated last year
- Configuration Extractors for Malware☆121Updated 8 months ago
- ☆117Updated 3 weeks ago
- ☆157Updated 8 months ago
- ☆24Updated 10 months ago
- Examine Chrome extensions for security issues☆90Updated last month
- This is practice VM for malware development☆170Updated last month
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 3 months ago
- A collection of CVEs weaponized by ransomware operators☆128Updated 2 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 2 months ago