Modular framework for automating triaging, malware analysis, and analyst workflows
☆45May 2, 2025Updated 11 months ago
Alternatives and similar repositories for Malcore-Playbook
Users that are interested in Malcore-Playbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 11 months ago
- ☆19May 18, 2025Updated 11 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 8 months ago
- Force target victim to unsafe network☆31Jun 6, 2025Updated 10 months ago
- Lastest Hashcat rules for password cracking☆71Apr 8, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Published security vulnerabilities for Apple platform with linked public repositories☆33Jun 25, 2024Updated last year
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆40Jul 4, 2025Updated 9 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- ☆25Jul 11, 2022Updated 3 years ago
- ☆19Dec 18, 2024Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- A Tool that aims to evade av with binary padding☆161Jun 28, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Free educational courses in reverse engineering, malware analysis, and programming☆481Aug 24, 2025Updated 7 months ago
- nanoMIPS module for Ghidra☆55Nov 6, 2025Updated 5 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆63Aug 18, 2025Updated 8 months ago
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆34Feb 12, 2026Updated 2 months ago
- ☆15Feb 12, 2023Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- ☆10Mar 27, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆135Mar 14, 2026Updated last month
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆20May 20, 2025Updated 11 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- ☆26Jun 2, 2023Updated 2 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆13Jan 24, 2026Updated 2 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated last year
- Lockbit, URSIF, BlackBasta etc.☆229Oct 23, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- Helping navigate through maps to prefer road-way.☆11Apr 6, 2022Updated 4 years ago
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆17Nov 7, 2025Updated 5 months ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated last year
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆33Apr 26, 2024Updated last year
- ☆28Dec 2, 2024Updated last year