PenetrumLLC / Malcore-PlaybookView external linksLinks
Modular framework for automating triaging, malware analysis, and analyst workflows
☆44May 2, 2025Updated 9 months ago
Alternatives and similar repositories for Malcore-Playbook
Users that are interested in Malcore-Playbook are comparing it to the libraries listed below
Sorting:
- Lastest Hashcat rules for password cracking☆63Feb 7, 2026Updated last week
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Sep 29, 2024Updated last year
- Repository of tools and resources for analyzing Docker containers☆72Nov 20, 2023Updated 2 years ago
- End-to-End Encrypted Messaging via GitHub Gists☆28Apr 14, 2025Updated 10 months ago
- ☆18May 18, 2025Updated 8 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 6 months ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆18Apr 14, 2024Updated last year
- A Tool that aims to evade av with binary padding☆160Jun 28, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Agentic LLM CTF to test prompt injection attacks and preventions☆27Feb 2, 2026Updated last week
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 3 months ago
- ☆24May 22, 2024Updated last year
- ☆63Dec 13, 2025Updated 2 months ago
- ☆48Nov 26, 2025Updated 2 months ago
- ☆28Dec 2, 2024Updated last year
- ☆27Aug 8, 2021Updated 4 years ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 3 weeks ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Apr 13, 2025Updated 10 months ago
- ☆22Jan 12, 2024Updated 2 years ago
- Free educational courses in reverse engineering, malware analysis, and programming☆475Aug 24, 2025Updated 5 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆180Sep 11, 2025Updated 5 months ago
- binary instrumentation, analysis, and patching framework☆100Feb 2, 2026Updated last week
- Rust Implementation of SharpDllProxy for DLL Proxying Technique☆29Oct 27, 2022Updated 3 years ago
- A security checking tool☆100Feb 4, 2026Updated last week
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 4 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Nov 12, 2025Updated 3 months ago
- Fuzzing IoT Devices Using the Router TL-WR902AC as Example☆126Nov 15, 2025Updated 2 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- ☆35Dec 21, 2023Updated 2 years ago
- CVE-2025-56383-Proof-of-Concept☆55Sep 26, 2025Updated 4 months ago
- LinkedIn recon the easy way☆111Jul 3, 2025Updated 7 months ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Jan 29, 2024Updated 2 years ago
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- Analysis scripts for Binary Ninja to work with Android NDK libraries.☆37Mar 27, 2022Updated 3 years ago
- An automated setup for fuzzing Redis w/ AFL++☆35Mar 12, 2022Updated 3 years ago
- Automation tool to testing and confirm the xss vulnerability.☆306Jul 18, 2025Updated 6 months ago
- PowerShell Reverse Shell☆80May 7, 2023Updated 2 years ago