Collection of scripts to automate the Malware Analysis process
☆32Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for Malware-Analysis-Toolkit
Users that are interested in Malware-Analysis-Toolkit are comparing it to the libraries listed below
Sorting:
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- Daily C2 threat intelligence feed☆19Updated this week
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 6 months ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆48Updated this week
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆109Apr 22, 2025Updated 10 months ago
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆68Dec 7, 2025Updated 2 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- General malware analysis stuff☆37Aug 26, 2024Updated last year
- Enrich your investigations on IPs, Domains etc. with OSINT☆58Apr 4, 2024Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- A web application dedicated to write sysmon configuration file☆13Oct 23, 2025Updated 4 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Jul 23, 2025Updated 7 months ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- It's an open source restaurant and coffee shop management system.☆10Jan 6, 2023Updated 3 years ago
- ☆54Feb 2, 2026Updated 3 weeks ago
- ☆42Dec 24, 2024Updated last year
- ThinkPHP 3.2.X POC Report By 风起☆12Apr 24, 2023Updated 2 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated 3 weeks ago
- Gatsby theme scarlet is a personal portfolio which features 3 slides, several beautiful shades of purple, and our star Scarlet.☆12Updated this week
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- 基于Kubernetes v1.22.2集群部署ELK日志分析系统。并收集与展示Nginx的access访问日志。☆12Jan 26, 2022Updated 4 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- App for tracking college bunks.☆54Apr 17, 2017Updated 8 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- ☆12Aug 22, 2017Updated 8 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆149Feb 14, 2026Updated last week