A curated list of awesome malware persistence tools and resources.
☆277Mar 31, 2026Updated 2 weeks ago
Alternatives and similar repositories for awesome-malware-persistence
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆186Mar 31, 2026Updated 2 weeks ago
- A curated list of awesome resources related to executable packing☆1,565Feb 14, 2026Updated 2 months ago
- A curated list of security card games.☆165Jun 2, 2025Updated 10 months ago
- 🕶 A high-level overview of the EVM security ecosystem☆194Jun 6, 2022Updated 3 years ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆961Apr 6, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆646Jun 19, 2024Updated last year
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆250Apr 1, 2026Updated 2 weeks ago
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆920Mar 15, 2026Updated last month
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A curated list of awesome privilege escalation☆1,534Mar 23, 2026Updated 3 weeks ago
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,852Jun 28, 2022Updated 3 years ago
- A curated list of awesome SNMP libraries, tools, and other resources.☆182Mar 30, 2026Updated 2 weeks ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,517Jan 26, 2026Updated 2 months ago
- This is a repository of resource about Malware techniques☆857Apr 8, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 3 years ago
- ☆83Aug 18, 2022Updated 3 years ago
- Learn about a type of vulnerability that specifically targets machine learning models☆458Apr 3, 2026Updated 2 weeks ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,854Aug 9, 2025Updated 8 months ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆985Nov 27, 2023Updated 2 years ago
- Great packages that use Scapy☆339Jun 9, 2025Updated 10 months ago
- A curated list of awesome embedded and IoT security resources.☆2,289Oct 17, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆444Mar 31, 2026Updated 2 weeks ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,168Apr 1, 2026Updated 2 weeks ago
- ⚠️ malware development☆693May 27, 2024Updated last year
- Defund the Police.☆13,608Jun 7, 2024Updated last year
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,228Jul 15, 2024Updated last year
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Security Content for the PEAK Threat Hunting Framework☆47Feb 15, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,620Jul 31, 2024Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Organized list of my malware development resources☆1,713Apr 1, 2026Updated 2 weeks ago
- Awesome radio stuff☆297Sep 23, 2019Updated 6 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Curating the best DevSecOps resources and tooling.☆1,661Aug 2, 2024Updated last year