jonescyber-ai / BlackfyreLinks
☆28Updated 5 months ago
Alternatives and similar repositories for Blackfyre
Users that are interested in Blackfyre are comparing it to the libraries listed below
Sorting:
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆56Updated 3 weeks ago
- Minimal workflows☆19Updated last year
- Code Repository for: AIRTBench: Measuring Autonomous AI Red Teaming Capabilities in Language Models☆31Updated this week
- Microsoft Developer Blogs Search Tool☆24Updated 2 months ago
- ☆16Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- From Zero to Hero in Web Security Research - Def Con 29 Workshop☆36Updated 11 months ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- ☆62Updated 11 months ago
- Data Scientists Go To Jupyter☆64Updated 3 months ago
- API and CLI tool to fetch and query Chome DevTools heap snapshots (Python & Playwright)☆14Updated last year
- Dusseldorf is an out-of-band security tool to help in security research.☆33Updated this week
- This repository contains the pre-joining training materials given to aspiring researchers on the Vulnerability Researcher Development Pro…☆72Updated 3 weeks ago
- CLI and API server for https://github.com/dreadnode/robopages☆33Updated last month
- This repository contains a variety of plugins and scripts, related to the Volatility framework.☆15Updated 4 months ago
- Proof-of-concept modular implant platform leveraging v8☆53Updated 3 months ago
- Linux #rootkit and #malware revealer☆26Updated 10 months ago
- A Python client for the Global CVE Allocation System.☆13Updated this week
- ☆22Updated 2 years ago
- Collection of red machine learning projects☆40Updated 3 years ago
- SuperPeHasher is a wrapper for several hash algorithms dedicated to PE file.☆28Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Automated vulnerability discovery and annotation☆67Updated 10 months ago
- AI fun☆25Updated 3 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 3 months ago
- ☆20Updated last year
- JXA script for Mythic that prints the TCC.db☆15Updated 4 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- A simple tool to create mermaid js markdown charts from CVE IDs and CVE keyword searches.☆43Updated 2 years ago