Made a sample fileless malware which could cause potential harm if used correctly.
☆19Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for Fileless-Malware
Users that are interested in Fileless-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆41Mar 31, 2026Updated last month
- Deep Research based on Claude Code's agentic framework 🦉⚡ export const SPINNER_VERBS = [ 'Accomplishing', 'Actioning', 'Actualizin…☆103Apr 4, 2026Updated last month
- Digital Forensics Essentials (DFE)☆14Mar 18, 2024Updated 2 years ago
- A simple and powerful app to masterfy your web assets. Compile SASS to CSS, Minify CSS and JS, Compress Image, and Live Reaload browser b…☆13Jun 27, 2021Updated 4 years ago
- Source code for the DEF CON 33 CTF Finals.☆29Aug 26, 2025Updated 8 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Python implementation of the MARCO/MARCOs algorithm for enumerating MUSes and MSS/MCSes of infeasible constraint systems.☆24Jan 4, 2026Updated 4 months ago
- Boilerplate for a Gulp-Workflow for a Youtube video. If you are lazy like me and are always on the watch out of how you can optimize your…☆16Dec 5, 2022Updated 3 years ago
- [TKDE 2023 ESI Highly Cited Paper] A Collaborative Alignment Framework of Transferable Knowledge Extraction for Unsupervised Domain Adapt…☆12Jul 15, 2022Updated 3 years ago
- A simple Password Manager using Tkinter.☆15Aug 6, 2017Updated 8 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Python wrapper for Google's reverse image search.☆32Apr 23, 2026Updated 3 weeks ago
- ☆17May 15, 2023Updated 3 years ago
- A Scalable Deep Learning Framework for Wave-Based Inverse Problems☆45May 3, 2026Updated 2 weeks ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Unofficial Implementation of the Global Local Attention Module in PyTorch☆20Dec 21, 2022Updated 3 years ago
- Deobfuscator for javascript samples obfuscated by obfuscator.io.☆62Apr 17, 2023Updated 3 years ago
- Password recovery payload for the BashBunny, using LaZagne.☆13Jan 7, 2021Updated 5 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- ☆17Nov 27, 2022Updated 3 years ago
- [AAAI 2024] MLNet: Mutual Learning Network with Neighborhood Invariance for Universal Domain Adaptation☆21Feb 29, 2024Updated 2 years ago
- Official implementation of Optimized Feature Generation for Tabular Data via LLMs with Decision Tree Reasoning (NeurIPS 2024).☆33Mar 4, 2025Updated last year
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated 3 months ago
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 10 months ago
- Code and results accompanying our paper titled Domain Adaptation under Open Set Label Shift☆34Nov 22, 2022Updated 3 years ago
- ☆33Mar 19, 2026Updated 2 months ago
- General Windows Hardening Script as well as cybersecuirty resources for cyberpatriot☆38Oct 1, 2025Updated 7 months ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated 2 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Jul 12, 2021Updated 4 years ago
- Nuclei template generator for WordPress plugins☆23Apr 22, 2024Updated 2 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆14Aug 16, 2024Updated last year
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆71Feb 22, 2026Updated 3 months ago
- GridAttackSim: Smart Grid Attack Simulation Framework☆28Feb 27, 2023Updated 3 years ago
- Reverts all changes made to Windows 10 (including disabled Cortana), caused by "Destroy Windows Spying" Tool [DWS_Lite.exe] to default st…☆10Dec 15, 2017Updated 8 years ago
- Golang-based SDK to CrowdStrike's APIs☆88May 14, 2026Updated last week