Made a sample fileless malware which could cause potential harm if used correctly.
☆18Dec 9, 2023Updated 2 years ago
Alternatives and similar repositories for Fileless-Malware
Users that are interested in Fileless-Malware are comparing it to the libraries listed below
Sorting:
- VolMemLyzer (Volatility Memory Analyzer) is a feature extraction module which use Volatility plugins to extract memory features to genera…☆41Nov 15, 2025Updated 4 months ago
- A simple and powerful app to masterfy your web assets. Compile SASS to CSS, Minify CSS and JS, Compress Image, and Live Reaload browser b…☆13Jun 27, 2021Updated 4 years ago
- Digital Forensics Essentials (DFE)☆13Mar 18, 2024Updated 2 years ago
- A Python implementation of the MARCO/MARCOs algorithm for enumerating MUSes and MSS/MCSes of infeasible constraint systems.☆24Jan 4, 2026Updated 2 months ago
- Boilerplate for a Gulp-Workflow for a Youtube video. If you are lazy like me and are always on the watch out of how you can optimize your…☆16Dec 5, 2022Updated 3 years ago
- [TKDE 2023 ESI Highly Cited Paper] A Collaborative Alignment Framework of Transferable Knowledge Extraction for Unsupervised Domain Adapt…☆12Jul 15, 2022Updated 3 years ago
- A simple Password Manager using Tkinter.☆16Aug 6, 2017Updated 8 years ago
- A lightweight python wrapper designed for leveraging Google's search by image capabilities to perform reverse image searches programatica…☆31Feb 5, 2024Updated 2 years ago
- ☆17May 15, 2023Updated 2 years ago
- A Scalable Deep Learning Framework for Wave-Based Inverse Problems☆44Mar 12, 2026Updated last week
- 这是一个shellcode简单的示例demo,使目标exe程序转换为shellcode可执行程序的一个demo【并不打算后期维护】,两年前写的,我发现被工作磨平了对技术的探索,今天翻到发现的。☆11Sep 23, 2023Updated 2 years ago
- Unofficial Implementation of the Global Local Attention Module in PyTorch☆20Dec 21, 2022Updated 3 years ago
- Deobfuscator for javascript samples obfuscated by obfuscator.io.☆58Apr 17, 2023Updated 2 years ago
- [AAAI 2024] MLNet: Mutual Learning Network with Neighborhood Invariance for Universal Domain Adaptation☆20Feb 29, 2024Updated 2 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆36Aug 13, 2023Updated 2 years ago
- Official implementation of Optimized Feature Generation for Tabular Data via LLMs with Decision Tree Reasoning (NeurIPS 2024).☆33Mar 4, 2025Updated last year
- A collection of cpuid instruction implementations for anti-vm purposes.☆10Oct 5, 2023Updated 2 years ago
- General Windows Hardening Script as well as cybersecuirty resources for cyberpatriot☆39Oct 1, 2025Updated 5 months ago
- Code and results accompanying our paper titled Domain Adaptation under Open Set Label Shift☆32Nov 22, 2022Updated 3 years ago
- ☆31Jul 24, 2020Updated 5 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- 🐞 A simple Windows x86 debugging framework written in C++20 that supports software breakpoints and hardware breakpoints. It can be used …☆13Mar 30, 2025Updated 11 months ago
- Transparently call NTAPI via Halo's Gate with indirect syscalls.☆15Apr 26, 2024Updated last year
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Jul 12, 2021Updated 4 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniques☆13Aug 16, 2024Updated last year
- GridAttackSim: Smart Grid Attack Simulation Framework☆27Feb 27, 2023Updated 3 years ago
- Reverts all changes made to Windows 10 (including disabled Cortana), caused by "Destroy Windows Spying" Tool [DWS_Lite.exe] to default st…☆10Dec 15, 2017Updated 8 years ago
- Golang-based SDK to CrowdStrike's APIs☆82Updated this week
- Cybersecurity Notes For Intermediate and Advanced Hackers | CEH Exam Prep Also Included☆67Feb 22, 2026Updated 3 weeks ago
- 使CMD能够高速调用API☆12Aug 27, 2018Updated 7 years ago
- Core Submodule of Exploration C2☆24Jan 27, 2026Updated last month
- Instrumented MIPS kernel☆14Sep 1, 2020Updated 5 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- ☆22Apr 23, 2024Updated last year
- Terminal user inferface toolkit☆25Nov 4, 2025Updated 4 months ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- Implementation of several code injection techniques.☆24Mar 12, 2022Updated 4 years ago
- replace the shellcode chatacters so that reduce the entropy☆18Sep 14, 2023Updated 2 years ago