A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
☆8,378Dec 23, 2025Updated 2 months ago
Alternatives and similar repositories for flare-vm
Users that are interested in flare-vm are comparing it to the libraries listed below
Sorting:
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,529Oct 16, 2025Updated 4 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,897Feb 23, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,617Feb 23, 2026Updated last week
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆2,083Dec 9, 2025Updated 2 months ago
- Defund the Police.☆13,472Jun 7, 2024Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,336Dec 6, 2025Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,493Updated this week
- Six Degrees of Domain Admin☆10,540Aug 1, 2025Updated 7 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,908Jul 6, 2024Updated last year
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,889Aug 17, 2020Updated 5 years ago
- An advanced memory forensics framework☆7,972May 16, 2025Updated 9 months ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,735Nov 19, 2025Updated 3 months ago
- A swiss army knife for pentesting networks☆9,082Dec 6, 2023Updated 2 years ago
- Adversary Emulation Framework☆10,759Updated this week
- Automated Adversary Emulation Platform☆6,781Updated this week
- A curated list of awesome YARA rules, tools, and people.☆4,146Updated this week
- Malware Configuration And Payload Extraction☆3,031Updated this week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,562Oct 31, 2025Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,300Jun 1, 2023Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,384Updated this week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,620Jul 18, 2024Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,452Feb 14, 2026Updated 2 weeks ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- Empire is a PowerShell and Python post-exploitation agent.☆7,818Jan 19, 2020Updated 6 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,779Apr 25, 2024Updated last year
- A little tool to play with Windows security☆21,300May 11, 2025Updated 9 months ago
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- Trying to tame the three-headed dog.☆4,904Nov 14, 2025Updated 3 months ago
- oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware a…☆3,295Feb 14, 2026Updated 2 weeks ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,479Jan 10, 2025Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,054Updated this week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,141Feb 23, 2026Updated last week
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,861Feb 1, 2026Updated last month
- Repository of yara rules☆4,722Apr 17, 2024Updated last year
- Digging Deeper....☆3,784Updated this week