Made a sample fileless malware which could cause potential harm if used correctly.
☆19Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for Fileless-Malware
Users that are interested in Fileless-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆41Mar 31, 2026Updated last month
- Deep Research based on Claude Code's agentic framework 🦉⚡ export const SPINNER_VERBS = [ 'Accomplishing', 'Actioning', 'Actualizin…☆101Apr 4, 2026Updated 3 weeks ago
- Digital Forensics Essentials (DFE)☆13Mar 18, 2024Updated 2 years ago
- A simple and powerful app to masterfy your web assets. Compile SASS to CSS, Minify CSS and JS, Compress Image, and Live Reaload browser b…☆13Jun 27, 2021Updated 4 years ago
- A Python implementation of the MARCO/MARCOs algorithm for enumerating MUSes and MSS/MCSes of infeasible constraint systems.☆24Jan 4, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Boilerplate for a Gulp-Workflow for a Youtube video. If you are lazy like me and are always on the watch out of how you can optimize your…☆16Dec 5, 2022Updated 3 years ago
- [TKDE 2023 ESI Highly Cited Paper] A Collaborative Alignment Framework of Transferable Knowledge Extraction for Unsupervised Domain Adapt…☆12Jul 15, 2022Updated 3 years ago
- A simple Password Manager using Tkinter.☆15Aug 6, 2017Updated 8 years ago
- Python wrapper for Google's reverse image search.☆32Apr 23, 2026Updated last week
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- ☆17May 15, 2023Updated 2 years ago
- A Scalable Deep Learning Framework for Wave-Based Inverse Problems☆44Apr 18, 2026Updated 2 weeks ago
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- Unofficial Implementation of the Global Local Attention Module in PyTorch☆20Dec 21, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Deobfuscator for javascript samples obfuscated by obfuscator.io.☆61Apr 17, 2023Updated 3 years ago
- Password recovery payload for the BashBunny, using LaZagne.☆13Jan 7, 2021Updated 5 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- ☆17Nov 27, 2022Updated 3 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- [AAAI 2024] MLNet: Mutual Learning Network with Neighborhood Invariance for Universal Domain Adaptation☆21Feb 29, 2024Updated 2 years ago
- Official implementation of Optimized Feature Generation for Tabular Data via LLMs with Decision Tree Reasoning (NeurIPS 2024).☆33Mar 4, 2025Updated last year
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Optimized for use in Kali Linux, KSploit is a user friendly menu driven control panel in which to drive many metasploit tasks. KSploit s…☆17Jul 2, 2025Updated 10 months ago
- Code and results accompanying our paper titled Domain Adaptation under Open Set Label Shift☆34Nov 22, 2022Updated 3 years ago
- General Windows Hardening Script as well as cybersecuirty resources for cyberpatriot☆39Oct 1, 2025Updated 7 months ago
- ☆33Mar 19, 2026Updated last month
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated last year
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated 2 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆17Jul 12, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Nuclei template generator for WordPress plugins☆23Apr 22, 2024Updated 2 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆71Feb 22, 2026Updated 2 months ago
- GridAttackSim: Smart Grid Attack Simulation Framework☆27Feb 27, 2023Updated 3 years ago
- Reverts all changes made to Windows 10 (including disabled Cortana), caused by "Destroy Windows Spying" Tool [DWS_Lite.exe] to default st…☆10Dec 15, 2017Updated 8 years ago
- Golang-based SDK to CrowdStrike's APIs☆87Apr 21, 2026Updated last week
- Core Submodule of Exploration C2☆24Apr 21, 2026Updated last week