Modular framework for automating triaging, malware analysis, and analyst workflows
☆45May 2, 2025Updated 10 months ago
Alternatives and similar repositories for Malcore-Playbook
Users that are interested in Malcore-Playbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- ☆19May 18, 2025Updated 10 months ago
- Force target victim to unsafe network☆31Jun 6, 2025Updated 9 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Published security vulnerabilities for Apple platform with linked public repositories☆32Jun 25, 2024Updated last year
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- ☆25Jul 11, 2022Updated 3 years ago
- ☆19Dec 18, 2024Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- A Tool that aims to evade av with binary padding☆161Jun 28, 2024Updated last year
- Free educational courses in reverse engineering, malware analysis, and programming☆477Aug 24, 2025Updated 7 months ago
- nanoMIPS module for Ghidra☆55Nov 6, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated last month
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- Custom nuclei templates for bug hunting.....☆26May 30, 2024Updated last year
- ☆15Feb 12, 2023Updated 3 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated 2 weeks ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 10 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This is for my crappy (but hopefully useful) MDE and Sentinel KQL queries! #KQLThePlanet☆13Jan 24, 2026Updated 2 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆133Apr 13, 2025Updated 11 months ago
- ☆61Dec 13, 2025Updated 3 months ago
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- Helping navigate through maps to prefer road-way.☆11Apr 6, 2022Updated 3 years ago
- Repository with Hunting and Detection Queries for Microsoft Sentinel and Microsoft Defender XDR☆17Nov 7, 2025Updated 4 months ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Rootkit for the blue team. Sophisticated and optimized LKM to detect and prevent malicious activity☆34Apr 26, 2024Updated last year
- The Azure Hyper-V Lab makes virtualization on Azure effortless, perfect for experimenting, learning, and building proof-of-concepts.☆15May 17, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆24May 22, 2024Updated last year
- Easily count site visitors with AWS Lambda and display it on your site.☆13Apr 15, 2025Updated 11 months ago
- End-to-End Encrypted Messaging via GitHub Gists☆29Apr 14, 2025Updated 11 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆127Jan 27, 2025Updated last year
- LinkedIn recon the easy way☆110Jul 3, 2025Updated 8 months ago
- Enables an LLM to remotely & securely control a jumphost using synchronous or asynchronous GET requests.☆13Mar 14, 2025Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago