inversecos / valentinewaifuLinks
☆15Updated 2 years ago
Alternatives and similar repositories for valentinewaifu
Users that are interested in valentinewaifu are comparing it to the libraries listed below
Sorting:
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- A collection of tools, scripts and personal research☆139Updated 3 weeks ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆154Updated last year
- ☆136Updated 2 years ago
- A C# based tool for analysing malicious OneNote documents☆114Updated 2 years ago
- ☆234Updated last month
- Ludus is a system to build easy to use cyber environments, or "ranges" for testing and development.☆42Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆135Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆165Updated 3 months ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 6 months ago
- ☆161Updated last year
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆37Updated 5 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆187Updated this week
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆81Updated 10 months ago
- ☆67Updated 5 months ago
- A ProcessMonitor visualization application written in rust.☆181Updated last year
- ☆115Updated last week
- Repository of Volatility3 plugins☆22Updated 2 years ago
- Repository of Yara Rules☆113Updated 3 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆113Updated 5 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆60Updated 10 months ago
- Configuration Extractors for Malware☆109Updated 3 months ago
- Python tool to check rootkits in Windows kernel☆197Updated 4 months ago
- Collection of scripts used to deobfuscate GOOTLOADER malware samples.☆63Updated 7 months ago
- Offensive Lua.☆188Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆57Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆144Updated 5 months ago
- A collection of art inspired by the world of cybersecurity and hacking culture.☆35Updated 2 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago