Repository of open source malware here on Github!
☆44Jan 11, 2022Updated 4 years ago
Alternatives and similar repositories for Open-source-Malware
Users that are interested in Open-source-Malware are comparing it to the libraries listed below
Sorting:
- Practice CTI Quiz☆13Mar 20, 2024Updated last year
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆10Nov 26, 2024Updated last year
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated 11 months ago
- ☆13Jan 4, 2022Updated 4 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 3 months ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- Collection of shellcode injection and execution techniques☆18Aug 21, 2025Updated 6 months ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆771Feb 8, 2026Updated 3 weeks ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- ☆151Jun 14, 2023Updated 2 years ago
- privilege escalation POCs built in Rust.☆19Jun 30, 2022Updated 3 years ago
- SOCMINT tool to find social media accounts.☆32Sep 12, 2024Updated last year
- SoulExtraction is a windows driver library for extracting cert information in windows drivers☆25Feb 12, 2023Updated 3 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆101Mar 27, 2022Updated 3 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Scrape valid media URLs from the Epstein Library☆21Feb 9, 2026Updated 2 weeks ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆37Sep 30, 2019Updated 6 years ago
- Sysmon shenanigans☆66Oct 9, 2020Updated 5 years ago
- PowerShell Module for managing Microsoft Defender Advanced Threat Protection☆76Nov 10, 2022Updated 3 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago