This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
☆20May 22, 2025Updated 11 months ago
Alternatives and similar repositories for MalwareAnalysis
Users that are interested in MalwareAnalysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆16Jun 3, 2022Updated 3 years ago
- Lightweight Threat Detection System - (Base)☆15Apr 15, 2024Updated 2 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆158May 22, 2025Updated 11 months ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Dec 13, 2023Updated 2 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- ☆13Nov 27, 2020Updated 5 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- ☆37May 9, 2023Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- My Awesome List☆12Updated this week
- A penetration testing Swiss Army Knife that's suitable for CTF challenges, bug bounty hunting and red team assessments.☆33Apr 21, 2026Updated last week
- ☆18Jun 25, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Windows driver template, using C++20 & cmake & GithubActions☆25Aug 9, 2024Updated last year
- Repository of different kernel drivers written while studying Windows NT Driver development☆12Apr 14, 2024Updated 2 years ago
- modified mssqlclient from impacket to extract policies from the SCCM database☆47Feb 24, 2026Updated 2 months ago
- Active directory Attacks and Scripts☆27Sep 8, 2023Updated 2 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- Windows Internals Book 7th edition Tools☆17Apr 26, 2020Updated 6 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- 域前置版本FRP☆17Nov 24, 2022Updated 3 years ago
- 大部分常见windows内核文件合集 感谢以下网站给出的版本号参考☆16Mar 4, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- Nightshade is a Windows Memory Manipluation library specifically for injecting DLLs and Game Hacking☆13Dec 12, 2022Updated 3 years ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆50May 8, 2024Updated last year
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆13Feb 4, 2022Updated 4 years ago
- 开发者工具箱,提供多种实用的开发工具,全部在浏览器端运行,无需后端支持。☆30Updated this week
- Generatrum Linguarum, a conlang word generator library☆11Mar 28, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jan 12, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆11Mar 25, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- https://www.huorong.cn/☆17Apr 16, 2024Updated 2 years ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆196Mar 25, 2026Updated last month
- ☆27Feb 3, 2026Updated 2 months ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆20Feb 29, 2024Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago