Collection of malware persistence and hunting information. Be a persistent persistence hunter!
☆186Mar 31, 2026Updated last month
Alternatives and similar repositories for malware-persistence
Users that are interested in malware-persistence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of awesome malware persistence tools and resources.☆284Mar 31, 2026Updated last month
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- PowerGRR is an API client library in PowerShell working on Windows, Linux and macOS for GRR automation and scripting.☆57Mar 18, 2022Updated 4 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆26Mar 25, 2021Updated 5 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Mar 18, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Parses KAPE module files and downloads binaries referenced by BinaryURL☆18Oct 2, 2019Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Forensic Artifact Collection Tool Matrix☆96Nov 9, 2024Updated last year
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- Defensomania is a security monitoring and incident response card game.☆64May 24, 2023Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆626Dec 8, 2025Updated 5 months ago
- A Powershell incident response framework☆1,650Nov 22, 2022Updated 3 years ago
- Digital Forensics artifact repository☆1,238Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆651Jun 19, 2024Updated last year
- ☆18Apr 4, 2019Updated 7 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,351Apr 18, 2026Updated 3 weeks ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- no longer maintained☆18Feb 22, 2018Updated 8 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆694Jul 6, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of resources for Threat Hunters☆917Oct 15, 2024Updated last year
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,820Apr 16, 2026Updated 3 weeks ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆576Aug 28, 2024Updated last year
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆292Oct 28, 2017Updated 8 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago