Elastic Security Labs' malware analysis and reverse engineering library
☆53Mar 10, 2026Updated 2 weeks ago
Alternatives and similar repositories for nightMARE
Users that are interested in nightMARE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆33Jan 17, 2026Updated 2 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated last month
- ☆11Oct 3, 2019Updated 6 years ago
- Cuckoo sandbox ansible role☆16Apr 30, 2023Updated 2 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- ☆62Feb 12, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- ☆28Jan 17, 2026Updated 2 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- Hardened your Windows OS against forensics analysis☆25Nov 27, 2024Updated last year
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- NSecSoftBYOVD POC☆58Feb 12, 2026Updated last month
- ☆26Nov 24, 2025Updated 4 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆125Dec 23, 2025Updated 3 months ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆188Feb 26, 2026Updated 3 weeks ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- Plugin for keepnote to import a XML nmap file☆27Jul 8, 2016Updated 9 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated last week
- IDA Terminal☆17Feb 27, 2026Updated 3 weeks ago
- A basic NodeJS/ExpressJS app that uses 2FA with both Google TOTP and Fido U2F☆10Dec 4, 2020Updated 5 years ago
- A Pythonisation of the restart-based condition system from Common Lisp☆15Feb 25, 2018Updated 8 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- Jekyll template for presentations with reveal.js☆28Oct 18, 2014Updated 11 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 3 months ago
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Demo Laravel application containing functional two-factor authentication.☆11Nov 3, 2018Updated 7 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- Puny Domain Name Check☆38Jul 29, 2019Updated 6 years ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆41Feb 16, 2026Updated last month
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago