Elastic Security Labs' malware analysis and reverse engineering library
☆54Mar 10, 2026Updated last month
Alternatives and similar repositories for nightMARE
Users that are interested in nightMARE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆34Jan 17, 2026Updated 3 months ago
- A self-hosted, real-time collaborative workspace for offensive security assessments.☆41Feb 20, 2026Updated 2 months ago
- ☆12Oct 3, 2019Updated 6 years ago
- Cuckoo sandbox ansible role☆16Apr 30, 2023Updated 3 years ago
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 11 months ago
- ☆62Feb 12, 2026Updated 2 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 6 months ago
- ☆28Jan 17, 2026Updated 3 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- IDA Pro plugin manager☆22Jan 23, 2023Updated 3 years ago
- Windows anti-forensics module☆25Apr 20, 2026Updated 2 weeks ago
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Python tool to find vulnerable AD object and generating csv report☆14Jul 4, 2022Updated 3 years ago
- Chiron Unpacker, developed by the Malwation MTR Team, is an Unpacker for Packers using the Assembly.Load function.☆22Oct 10, 2024Updated last year
- ☆26Nov 24, 2025Updated 5 months ago
- ☆13Nov 10, 2020Updated 5 years ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- PIC shellcode (C/C++) development toolkit designed for malware developers.☆128Dec 23, 2025Updated 4 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆52Dec 31, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Plugin for keepnote to import a XML nmap file☆27Jul 8, 2016Updated 9 years ago
- ncurses shellcode/instructions tester using unicorn-engine☆13Feb 1, 2025Updated last year
- IDA Terminal☆18Feb 27, 2026Updated 2 months ago
- A basic NodeJS/ExpressJS app that uses 2FA with both Google TOTP and Fido U2F☆10Dec 4, 2020Updated 5 years ago
- A Pythonisation of the restart-based condition system from Common Lisp☆15Feb 25, 2018Updated 8 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 3 months ago
- KVC enables unsigned driver loading via DSE bypass (g_CiOptions patch, skci.dll hijack, SeCiCallbacks redirection) and PP/PPL manipulatio…☆224Apr 20, 2026Updated 2 weeks ago
- Jekyll template for presentations with reveal.js☆28Oct 18, 2014Updated 11 years ago
- A collection of ready-to-use library code and symbols for the MinHash-based Code Relationship & Investigation Toolkit (MCRIT)☆12Dec 10, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Linux BPF plugins for Volatility3☆23Jan 19, 2024Updated 2 years ago
- An MCP-capable intelligent Apple podcast transcription and summarization to markdown tool.☆29Feb 2, 2026Updated 3 months ago
- Java RAT called STRRat - Source code & Deobfuscator☆12Aug 12, 2022Updated 3 years ago
- ☆27Mar 11, 2026Updated last month
- Demo Laravel application containing functional two-factor authentication.☆11Nov 3, 2018Updated 7 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago