A GUI and CLI tool for removing bloat from executables
☆446Apr 10, 2026Updated 2 weeks ago
Alternatives and similar repositories for debloat
Users that are interested in debloat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- High Octane Triage Analysis☆841Updated this week
- A C# based tool for analysing malicious OneNote documents☆118Apr 4, 2023Updated 3 years ago
- A python library to parse OneNote (.one) files☆153Jul 11, 2024Updated last year
- Collection of my own detection rules☆20Jan 6, 2026Updated 3 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆706Apr 21, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Static Decryptor for IcedID Malware☆18Oct 1, 2022Updated 3 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,760Apr 16, 2026Updated last week
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆39Feb 18, 2023Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,108Dec 11, 2024Updated last year
- Dynamic unpacker based on PE-sieve☆809Apr 14, 2026Updated 2 weeks ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆818Mar 16, 2024Updated 2 years ago
- ☆118Feb 13, 2026Updated 2 months ago
- ☆27Feb 6, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Live Feed of C2 servers, tools, and botnets☆771Apr 13, 2026Updated 2 weeks ago
- ☆186Apr 24, 2025Updated last year
- Windows kernel and user mode emulation.☆1,949Apr 8, 2026Updated 3 weeks ago
- A repository of credential stealer formats☆252Jun 10, 2025Updated 10 months ago
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- Malware Configuration And Payload Extraction☆3,153Apr 22, 2026Updated last week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,523Apr 1, 2026Updated 3 weeks ago
- ☆128Mar 7, 2026Updated last month
- Elastic Security detection content for Endpoint☆1,418Apr 13, 2026Updated 2 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Encyclopedia for Executables☆478Nov 9, 2021Updated 4 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆650Nov 7, 2025Updated 5 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆859Feb 2, 2024Updated 2 years ago
- Powershell/Javascript deobfuscator based on tree-sitter☆95Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 2 months ago
- A Binary Genetic Traits Lexer Framework☆567Updated this week
- for bones that are too dense☆41Mar 19, 2023Updated 3 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆43Jul 18, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 4 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Jun 28, 2023Updated 2 years ago
- Aims to identify sleeping beacons☆666Jan 25, 2026Updated 3 months ago