It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all other samples using YARA rules, CalmAV signatures, etc. This tool is based on MalwareBazaar.
☆20Jul 22, 2025Updated 9 months ago
Alternatives and similar repositories for malbuzz
Users that are interested in malbuzz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It is a simple PHP backdoor created for educational and learning purposes.☆14Mar 23, 2023Updated 3 years ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆19Sep 9, 2025Updated 7 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- Registry timestamp manipulation☆18Feb 26, 2014Updated 12 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- ☆14Nov 30, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 11 months ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- ☆23Sep 7, 2023Updated 2 years ago
- QR code Ghostmode☆27Jul 30, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Classic Process Injection with Memory Evasion Techniques implemantation☆74Oct 28, 2023Updated 2 years ago
- ☆25Mar 5, 2023Updated 3 years ago
- Checker de Spotify en la terminal [TERMUX]☆21Feb 26, 2023Updated 3 years ago
- ☆20Apr 5, 2023Updated 3 years ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 11 months ago
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated last year
- A "dream-come-true" for hackers and penetration testers, Venom RAT has managed to bring the best of both worlds into a single tool. You w…☆19Sep 22, 2023Updated 2 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆19Dec 23, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated 2 months ago
- Showcasing the design patterns you can use alongside Model-View-ViewModel (MVVM).☆13Apr 21, 2021Updated 5 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆45Apr 14, 2026Updated 2 weeks ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12May 13, 2024Updated last year
- ☆33May 19, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆13Dec 21, 2024Updated last year
- ☆17Oct 26, 2021Updated 4 years ago
- THOR APT Scanner User Manual☆21Apr 22, 2026Updated last week