A curated list of awesome malware persistence tools and resources.
☆284Mar 31, 2026Updated last month
Alternatives and similar repositories for awesome-malware-persistence
Users that are interested in awesome-malware-persistence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆186Mar 31, 2026Updated last month
- A curated list of awesome things related to Suricata☆229Nov 21, 2025Updated 5 months ago
- A curated list of awesome resources related to executable packing☆1,577Feb 14, 2026Updated 2 months ago
- A curated list of security card games.☆167Jun 2, 2025Updated 11 months ago
- A curated list of awesome Fuzzing(or Fuzz Testing) for software security☆964Apr 6, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆651Jun 19, 2024Updated last year
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆252Apr 1, 2026Updated last month
- A curated list of awesome tools, research, papers and other projects related to password cracking and password security.☆941Mar 15, 2026Updated last month
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- A curated list of awesome privilege escalation☆1,546Mar 23, 2026Updated last month
- A curated list of awesome guides, tools, and other resources related to the security and compromise of locks, safes, and keys.☆1,863Jun 28, 2022Updated 3 years ago
- A curated list of awesome SNMP libraries, tools, and other resources.☆183Mar 30, 2026Updated last month
- Awesome EDR Bypass Resources For Ethical Hacking☆1,522Jan 26, 2026Updated 3 months ago
- This is a repository of resource about Malware techniques☆859Apr 8, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- Bypassing AV, EDR, Application Whitelisting and ASR Rules☆13Apr 18, 2023Updated 3 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- 🎓 Because Education should be free. Contributions welcome! 🕵️☆2,914Aug 9, 2025Updated 9 months ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆991Nov 27, 2023Updated 2 years ago
- Great packages that use Scapy☆344Jun 9, 2025Updated 11 months ago
- A curated list of awesome embedded and IoT security resources.☆2,305Oct 17, 2023Updated 2 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆444Mar 31, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆119Mar 8, 2023Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,189Apr 30, 2026Updated last week
- ⚠️ malware development☆698May 27, 2024Updated last year
- Defund the Police.☆13,702Jun 7, 2024Updated last year
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,265Jul 15, 2024Updated last year
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Security Content for the PEAK Threat Hunting Framework☆47Feb 15, 2024Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- SysWhispers on Steroids - AV/EDR evasion via direct system calls.☆1,627Jul 31, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Organized list of my malware development resources☆1,725Apr 1, 2026Updated last month
- Awesome radio stuff☆300Sep 23, 2019Updated 6 years ago
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆211Nov 12, 2025Updated 5 months ago
- Curating the best DevSecOps resources and tooling.☆1,673Aug 2, 2024Updated last year
- A curated list of awesome Real Time Communications resources☆478Feb 28, 2026Updated 2 months ago