A GUI and CLI tool for removing bloat from executables
☆446Jul 5, 2025Updated 8 months ago
Alternatives and similar repositories for debloat
Users that are interested in debloat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High Octane Triage Analysis☆836Updated this week
- A python library to parse OneNote (.one) files☆145Jul 11, 2024Updated last year
- Collection of my own detection rules☆20Jan 6, 2026Updated 2 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆702Oct 22, 2025Updated 5 months ago
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,715Mar 21, 2026Updated last week
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,078Dec 11, 2024Updated last year
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Feb 18, 2023Updated 3 years ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 6 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆814Mar 16, 2024Updated 2 years ago
- ☆117Feb 13, 2026Updated last month
- ☆27Feb 6, 2022Updated 4 years ago
- Live Feed of C2 servers, tools, and botnets☆760Updated this week
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Windows kernel and user mode emulation.☆1,906Updated this week
- A repository of credential stealer formats☆252Jun 10, 2025Updated 9 months ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- Malware Configuration And Payload Extraction☆3,094Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- Elastic Security detection content for Endpoint☆1,392Updated this week
- ☆127Mar 7, 2026Updated 3 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated last year
- Encyclopedia for Executables☆475Nov 9, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- ☆182Apr 24, 2025Updated 11 months ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆648Nov 7, 2025Updated 4 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆858Feb 2, 2024Updated 2 years ago
- Powershell/Javascript deobfuscator based on tree-sitter☆93Updated this week
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Binary Genetic Traits Lexer Framework☆525Updated this week
- for bones that are too dense☆40Mar 19, 2023Updated 3 years ago
- Analyse your malware to surgically obfuscate it☆524Dec 17, 2025Updated 3 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆664Jan 25, 2026Updated 2 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆95Dec 2, 2025Updated 3 months ago