A curated list of awesome malware persistence tools and resources.
☆274Oct 3, 2025Updated 5 months ago
Alternatives and similar repositories for awesome-malware-persistence
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below
Sorting:
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆185Oct 3, 2025Updated 5 months ago
- A curated list of awesome things related to Suricata☆221Nov 21, 2025Updated 3 months ago
- 🕶 A high-level overview of the EVM security ecosystem☆192Jun 6, 2022Updated 3 years ago
- A curated list of awesome resources related to executable packing☆1,543Feb 14, 2026Updated 3 weeks ago
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆248Dec 29, 2025Updated 2 months ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆957Nov 20, 2023Updated 2 years ago
- A curated list of security card games.☆159Jun 2, 2025Updated 9 months ago
- A curated list of awesome privilege escalation☆1,518Aug 20, 2025Updated 6 months ago
- A curated list of awesome SNMP libraries, tools, and other resources.☆180Feb 13, 2026Updated 3 weeks ago
- Polymorphic ELF Runtime Crypter written in rust.☆21Jan 21, 2021Updated 5 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆898Jun 6, 2025Updated 9 months ago
- ☆84Aug 18, 2022Updated 3 years ago
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆981Nov 27, 2023Updated 2 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,490Jan 26, 2026Updated last month
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,821Jun 28, 2022Updated 3 years ago
- Learn about a type of vulnerability that specifically targets machine learning models☆413Feb 25, 2026Updated last week
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Great packages that use Scapy☆333Jun 9, 2025Updated 9 months ago
- ☆84Nov 21, 2024Updated last year
- ⚠️ malware development☆689May 27, 2024Updated last year
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,779Aug 9, 2025Updated 7 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Organized list of my malware development resources☆1,701May 16, 2022Updated 3 years ago
- A curated list of awesome embedded and IoT security resources.☆2,234Oct 17, 2023Updated 2 years ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,148Dec 19, 2025Updated 2 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Apr 6, 2025Updated 11 months ago
- collection of apis used in malware development☆229Aug 2, 2022Updated 3 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆386Jul 30, 2024Updated last year
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆443Jul 10, 2024Updated last year
- Curating the best DevSecOps resources and tooling.☆1,637Aug 2, 2024Updated last year
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆281Jan 26, 2026Updated last month