A curated list of awesome malware persistence tools and resources.
☆278Oct 3, 2025Updated 5 months ago
Alternatives and similar repositories for awesome-malware-persistence
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆186Oct 3, 2025Updated 5 months ago
- A curated list of awesome things related to Suricata☆221Nov 21, 2025Updated 4 months ago
- A curated list of awesome resources related to executable packing☆1,550Feb 14, 2026Updated last month
- A curated list of security card games.☆163Jun 2, 2025Updated 9 months ago
- 🕶 A high-level overview of the EVM security ecosystem☆194Jun 6, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆958Nov 20, 2023Updated 2 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆249Dec 29, 2025Updated 3 months ago
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆910Mar 15, 2026Updated 2 weeks ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A curated list of awesome privilege escalation☆1,525Mar 23, 2026Updated last week
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,838Jun 28, 2022Updated 3 years ago
- A curated list of awesome SNMP libraries, tools, and other resources.☆181Feb 13, 2026Updated last month
- Awesome EDR Bypass Resources For Ethical Hacking☆1,500Jan 26, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a repository of resource about Malware techniques☆825Apr 8, 2023Updated 2 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 2 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,827Aug 9, 2025Updated 7 months ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆984Nov 27, 2023Updated 2 years ago
- Great packages that use Scapy☆335Jun 9, 2025Updated 9 months ago
- A curated list of awesome embedded and IoT security resources.☆2,259Oct 17, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆445Jul 10, 2024Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- ⚠️ malware development☆692May 27, 2024Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,159Dec 19, 2025Updated 3 months ago
- Defund the Police.☆13,538Jun 7, 2024Updated last year
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,214Jul 15, 2024Updated last year
- Security Content for the PEAK Threat Hunting Framework☆46Feb 15, 2024Updated 2 years ago
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,606Jul 31, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Organized list of my malware development resources☆1,703May 16, 2022Updated 3 years ago
- Awesome radio stuff☆297Sep 23, 2019Updated 6 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 4 months ago
- Curating the best DevSecOps resources and tooling.☆1,649Aug 2, 2024Updated last year
- A curated list of awesome Real Time Communications resources☆468Feb 28, 2026Updated last month