Recopilación de enlaces para análisis de Malware. También se realizará descarga de automática, worlflows, de los feeds para crear un repositorio de feeds.
☆31Apr 12, 2026Updated last week
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Distrubición Linux para Osint☆59Sep 9, 2018Updated 7 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆39Feb 18, 2023Updated 3 years ago
- Repository explores Core Concepts in Software Testing☆14Dec 23, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆24Jan 13, 2022Updated 4 years ago
- Base de conocimiento de DevOps en formato de curso académico virtual, orientado a un consumo autodidacta.☆12Jan 17, 2025Updated last year
- 🔥 CEHv12 Certificate documentation 📚☆11Jun 29, 2023Updated 2 years ago
- Traceability in blockchain (ethereum and binance for now)☆19Nov 9, 2024Updated last year
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Dreg's setup for lldb reversing. The simplest and easiest possible, without scripting. lldb debugging setup.☆14May 2, 2024Updated last year
- In this practice-oriented Bachelor in Cyber Security study programme, available fully online, you will be trained as a threat hunter with…☆15May 28, 2024Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- A bunch of infrastructure automation scripts I use in my courses, in case you find them useful!☆42Aug 22, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆97Mar 11, 2026Updated last month
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Community curated list of templates for the OSINT template engine.☆22Jul 11, 2023Updated 2 years ago
- a small wiper malware programmed in c#☆64Nov 17, 2022Updated 3 years ago
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- Config files for my GitHub profile.☆32Mar 27, 2026Updated 3 weeks ago
- CEH v13 i-labs , CEH v13 Engage Answers☆39Jul 5, 2025Updated 9 months ago
- Mastering AI in Cybersecurity: From Theory to Practice.☆17Dec 17, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- Open-Source Ransomware As A Service for Linux, MacOS and Windows☆15Dec 20, 2020Updated 5 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- Penetration testing “drop box”☆14Sep 12, 2018Updated 7 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆41Updated this week
- Netcat binaries compiled for ARM that work on Android devices☆12Jun 12, 2015Updated 10 years ago
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- ☆21Jun 23, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Made it possible for **everyone** to walk around in a Zoom Meeting with Breakout Rooms, pre-September 21, 2020!☆15Sep 12, 2020Updated 5 years ago
- ☆18Dec 23, 2024Updated last year
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 9 months ago
- a breakdown of the Certified Ethical Hacker (CEH v13) course modules along with their key objectives. These modules are structured to al…☆23Jul 13, 2025Updated 9 months ago