Some of my Malware Analysis writeups
☆51Oct 3, 2025Updated 6 months ago
Alternatives and similar repositories for malware-analysis-writeups
Users that are interested in malware-analysis-writeups are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some Cyber Security related scripts☆18Jul 18, 2023Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- A library for quickly and easily encrypting strings and text file content.☆12Jul 1, 2021Updated 4 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆53Sep 19, 2023Updated 2 years ago
- Nim process hollowing loader☆62Jul 22, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- Nimbo-C2 is yet another (simple and lightweight) C2 framework☆442Jan 29, 2026Updated 2 months ago
- This is the official repository for Basic Malware Analysis Course☆20Jan 11, 2022Updated 4 years ago
- RegStrike is a .reg payload generator☆57Sep 19, 2023Updated 2 years ago
- Threadless shellcode injection tool☆68Aug 5, 2024Updated last year
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated 2 years ago
- Rootless keylogger for X☆33Oct 18, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Code files for CSD 310☆15Aug 19, 2023Updated 2 years ago
- ☆27May 6, 2024Updated last year
- Provides server-side before/after hooks for Meteor methods☆11Jan 12, 2016Updated 10 years ago
- ☆19Aug 6, 2021Updated 4 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 7 months ago
- ☆19Sep 21, 2020Updated 5 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- ☆17Mar 31, 2026Updated last week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A powershell parser for https://github.com/ufrisk/MemProcFS☆45May 12, 2021Updated 4 years ago
- shared samples from #dailyphish and/or #apt tweets☆42Sep 3, 2025Updated 7 months ago
- ☆24Mar 12, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Retrieve inner payloads from Donut samples☆124Mar 12, 2026Updated 3 weeks ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆11Feb 25, 2021Updated 5 years ago
- ☆65May 26, 2023Updated 2 years ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆23Oct 30, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Sep 26, 2019Updated 6 years ago
- A tool for studying JavaScript malware.