☆42Dec 24, 2024Updated last year
Alternatives and similar repositories for Malware-Analysis-Exercises
Users that are interested in Malware-Analysis-Exercises are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Mar 30, 2021Updated 5 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆16Aug 8, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- ☆65May 26, 2023Updated 2 years ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 5 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 11 months ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Reports from various areas of information security☆272Apr 13, 2024Updated 2 years ago
- Checklists for Testing Security environment☆895Mar 12, 2025Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆46Jul 23, 2024Updated last year
- ☆34Jan 17, 2026Updated 3 months ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incide…☆128Feb 21, 2025Updated last year
- .NET assembly loader with patching AMSI and ETW bypass☆33Apr 16, 2025Updated last year
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- ☆23Jun 28, 2025Updated 9 months ago
- An open-source, web-based platform that helps users learn programming through interactive, real-time coding challenges.☆22Jul 11, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- Public Exploits☆10Apr 6, 2021Updated 5 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 4 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Updated this week
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆16Mar 20, 2024Updated 2 years ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 7 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Most Responder's configuration power in your hand.☆54Jan 19, 2025Updated last year
- ☆24Mar 25, 2025Updated last year
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- The Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples.☆66Apr 15, 2024Updated 2 years ago
- Prototype Pollution Lab☆18Nov 20, 2020Updated 5 years ago
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 6 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago