It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all other samples using YARA rules, CalmAV signatures, etc. This tool is based on MalwareBazaar.
☆20Jul 22, 2025Updated 8 months ago
Alternatives and similar repositories for malbuzz
Users that are interested in malbuzz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It is a simple PHP backdoor created for educational and learning purposes.☆14Mar 23, 2023Updated 3 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆19Sep 9, 2025Updated 7 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- ☆14Nov 30, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 10 months ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- ☆23Sep 7, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆25Mar 5, 2023Updated 3 years ago
- Checker de Spotify en la terminal [TERMUX]☆21Feb 26, 2023Updated 3 years ago
- ☆20Apr 5, 2023Updated 3 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 10 months ago
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated last year
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆17Sep 22, 2023Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Showcasing the design patterns you can use alongside Model-View-ViewModel (MVVM).☆13Apr 21, 2021Updated 4 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆44Jan 18, 2026Updated 2 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- ☆11May 13, 2024Updated last year
- ☆33May 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Turn your Solana Seeker (or any Android phone) into a 24/7 personal AI agent☆93Updated this week
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated last week
- A 2d renderer for openFrameworks based on the ShivaVG library☆11Mar 20, 2022Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago