A GUI and CLI tool for removing bloat from executables
☆443Jul 5, 2025Updated 8 months ago
Alternatives and similar repositories for debloat
Users that are interested in debloat are comparing it to the libraries listed below
Sorting:
- A C# based tool for analysing malicious OneNote documents☆117Apr 4, 2023Updated 2 years ago
- High Octane Triage Analysis☆820Feb 28, 2026Updated last week
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆697Oct 22, 2025Updated 4 months ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- A python library to parse OneNote (.one) files☆142Jul 11, 2024Updated last year
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆807Mar 16, 2024Updated last year
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,056Dec 11, 2024Updated last year
- ☆115Feb 13, 2026Updated 3 weeks ago
- Live Feed of C2 servers, tools, and botnets☆751Updated this week
- ☆27Feb 6, 2022Updated 4 years ago
- ☆181Apr 24, 2025Updated 10 months ago
- Windows kernel and user mode emulation.☆1,868Updated this week
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- Analyse your malware to surgically obfuscate it☆520Dec 17, 2025Updated 2 months ago
- Powershell Linter☆89Updated this week
- Collection of my own detection rules☆20Jan 6, 2026Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- Encyclopedia for Executables☆471Nov 9, 2021Updated 4 years ago
- Dynamic unpacker based on PE-sieve☆799Sep 13, 2025Updated 5 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,460Updated this week
- ☆127Feb 24, 2026Updated last week
- Elastic Security detection content for Endpoint☆1,380Feb 26, 2026Updated last week
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆662Jan 25, 2026Updated last month
- Malware Configuration And Payload Extraction☆3,031Feb 27, 2026Updated last week
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 3 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆646Nov 7, 2025Updated 4 months ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆864Jan 20, 2022Updated 4 years ago
- PowerShell script helping Incident Responders discover potential adversary persistence mechanisms.☆324May 1, 2025Updated 10 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Collaborative Incident Response platform☆1,429Feb 16, 2026Updated 2 weeks ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆261Jun 29, 2024Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- EDR Lab for Experimentation Purposes☆1,415Updated this week
- A python script developed to process Windows memory images based on triage type.☆266Nov 25, 2023Updated 2 years ago
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,483Feb 16, 2026Updated 2 weeks ago