Lena's repo of Malware Monsters aka Malmons.
☆45Feb 12, 2026Updated 3 weeks ago
Alternatives and similar repositories for MalwareMonsters
Users that are interested in MalwareMonsters are comparing it to the libraries listed below
Sorting:
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 7 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082☆26Oct 2, 2022Updated 3 years ago
- A Vim syntax highlighting for YARA and YARA-X rules☆31Jan 1, 2026Updated 2 months ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- ☆36Oct 26, 2023Updated 2 years ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Updated this week
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago
- AES-256 Microsoft Cryptography API Example Use.☆35Feb 2, 2026Updated last month
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- A tool which helps identifying client-side prototype polluting libraries☆39May 1, 2025Updated 10 months ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆170Jul 20, 2024Updated last year
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 10 months ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Python Visual Hash, generate a visual random image associated with a string.☆11Apr 23, 2017Updated 8 years ago
- ☆13Mar 28, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- Cypherpunks Hall of Fame☆23Nov 10, 2025Updated 3 months ago
- Cobaltstrike UDRL with memory evasion☆15May 16, 2024Updated last year
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- 作業系統實作☆13Apr 26, 2018Updated 7 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆16Jan 14, 2026Updated last month
- Blog aggregator for pegelinux community☆10Dec 9, 2022Updated 3 years ago
- A lightweight http server for linux☆17Jun 1, 2025Updated 9 months ago
- RFM69 ISM Transceiver driver for esp-idf☆11Feb 27, 2026Updated last week
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago