PenetrumLLC / Malcore-PlaybookView external linksLinks
Modular framework for automating triaging, malware analysis, and analyst workflows
☆44May 2, 2025Updated 9 months ago
Alternatives and similar repositories for Malcore-Playbook
Users that are interested in Malcore-Playbook are comparing it to the libraries listed below
Sorting:
- Force target victim to unsafe network☆30Jun 6, 2025Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆24Sep 29, 2024Updated last year
- Repository of tools and resources for analyzing Docker containers☆72Nov 20, 2023Updated 2 years ago
- ☆18May 18, 2025Updated 8 months ago
- End-to-End Encrypted Messaging via GitHub Gists☆28Apr 14, 2025Updated 10 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Signal Tracking & Detection☆23Jan 24, 2026Updated 3 weeks ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 6 months ago
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 5 months ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆18Apr 14, 2024Updated last year
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Another™ MCP Server for Binary Ninja with superpower 🥵☆31May 13, 2025Updated 9 months ago
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 9 months ago
- Agentic LLM CTF to test prompt injection attacks and preventions☆27Feb 2, 2026Updated last week
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- ☆62Dec 13, 2025Updated 2 months ago
- ☆27Aug 8, 2021Updated 4 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆42Jun 12, 2025Updated 8 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 3 weeks ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Apr 13, 2025Updated 10 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- Custom nuclei templates for bug hunting.....☆27May 30, 2024Updated last year
- GSM Base Station on Raspberry Pi using CalypsoBTS☆28Jan 6, 2024Updated 2 years ago
- ☆22Jan 12, 2024Updated 2 years ago
- PoC exploit for the vulnerable WatchDog Anti-Malware driver (amsdk.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆180Sep 11, 2025Updated 5 months ago
- 🐍 High-performance, multi-threaded YARA & IOC scanner☆262Updated this week
- Nuclei scripts created by @rxerium for zero days / actively exploited vulnerabilities.☆76Feb 5, 2026Updated last week
- ☆85May 15, 2025Updated 8 months ago
- make your machine look like a sandbox/vm 🤖☆29Aug 17, 2022Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- Find jmp gadgets for call stack spoofing.☆75Oct 1, 2025Updated 4 months ago
- A suite of modules for computing spectral estimates from data.☆26Nov 24, 2021Updated 4 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Nov 12, 2025Updated 3 months ago
- CVE-2025-56383-Proof-of-Concept☆55Sep 26, 2025Updated 4 months ago
- ☆35Dec 21, 2023Updated 2 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Nov 12, 2025Updated 3 months ago
- ☆94Dec 15, 2025Updated last month
- LinkedIn recon the easy way☆111Jul 3, 2025Updated 7 months ago