Collection of scripts to automate the Malware Analysis process
☆33Oct 27, 2025Updated 4 months ago
Alternatives and similar repositories for Malware-Analysis-Toolkit
Users that are interested in Malware-Analysis-Toolkit are comparing it to the libraries listed below
Sorting:
- Daily C2 threat intelligence feed☆19Updated this week
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆49Feb 28, 2026Updated 2 weeks ago
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- ZenScraper is an asynchronous scraper built with Python and Playwright designed for efficiently retrieving tweets from X.com (formerly Tw…☆15May 9, 2025Updated 10 months ago
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆110Apr 22, 2025Updated 10 months ago
- ☆16Mar 12, 2026Updated last week
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated last month
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 7 months ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Everything related to YARA☆16Feb 19, 2026Updated last month
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Cyber Defence related kusto queries for use in Azure Sentinel and Defender advanced hunting☆68Dec 7, 2025Updated 3 months ago
- It's an open source restaurant and coffee shop management system.☆10Jan 6, 2023Updated 3 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 2 weeks ago
- ☆27Nov 26, 2024Updated last year
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- Visualize Microsoft Defender XDR process trees and security events☆32Aug 24, 2025Updated 6 months ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Apr 11, 2023Updated 2 years ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- Velociraptor Server hosted in Azure App Service☆59Jun 4, 2025Updated 9 months ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- Official urlscan.io and urlscan Pro CLI tool☆31Updated this week
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- GenAI-STIX2.1-Generator is a tool that leverages Azure OpenAI capabilities to transform threat intelligence reports from unstructured web…☆24Mar 24, 2025Updated 11 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆17Nov 1, 2021Updated 4 years ago