collection of blogs about malware development and analysis
☆65Dec 2, 2025Updated 3 months ago
Alternatives and similar repositories for mlwr_blogs
Users that are interested in mlwr_blogs are comparing it to the libraries listed below
Sorting:
- Caddy v2 module to filter requests based on C2 profiles☆46Apr 24, 2025Updated 10 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- ProxyWatch☆37Feb 28, 2026Updated last week
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- A C# tool for extracting information from SCCM PXE boot media.☆51Jan 14, 2026Updated last month
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Slides and resources from MCTTP 2025 Talk☆66Oct 26, 2025Updated 4 months ago
- ☆55Nov 18, 2025Updated 3 months ago
- ☆58Dec 10, 2025Updated 2 months ago
- Simple and sane cryptographic wrapper library.☆27Apr 21, 2023Updated 2 years ago
- A security checking tool☆106Feb 4, 2026Updated last month
- A tool to easily perform GitHub Device Code Phishing on red team engagements☆87Feb 9, 2026Updated 3 weeks ago
- Indirect Syscall implementation to bypass userland NTAPIs hooking.☆85Aug 13, 2024Updated last year
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- Python tool to automatically perform SPN-less RBCD attacks.☆123Jan 7, 2026Updated 2 months ago
- Purple-team telemetry & simulation toolkit.☆108Dec 16, 2025Updated 2 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 6 months ago
- A Powerful XSS,RXSS,BXSS finding tool☆31Oct 29, 2025Updated 4 months ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- IDA Terminal☆17Feb 27, 2026Updated last week
- ☆19Updated this week
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆28Updated this week
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 5 months ago
- A Beacon Object File (BOF) that talks directly to Windows authentication packages through the LSA untrusted/trusted client interface, wit…☆265Feb 21, 2026Updated 2 weeks ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- A simple self-hosted tool to capture, inspect, and debug incoming webhooks in real time.☆26Oct 28, 2025Updated 4 months ago
- A color generator TUI application made with ratatui☆24Dec 21, 2025Updated 2 months ago
- A method for parsing Snort Barnyard2 logs from pfSense in Graylog☆10May 26, 2020Updated 5 years ago
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆65Updated this week
- ☆10Oct 29, 2019Updated 6 years ago
- Demo app showing how to implement authentication with BetterAuth in a TanStack Start app with LiveStore.☆35Nov 19, 2025Updated 3 months ago
- IDA plugin to Display Mach-O headers☆21Nov 4, 2011Updated 14 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- Convert ARIN Whois bulk data to computer parsable routing data☆10Jan 2, 2018Updated 8 years ago
- An Interval Tree Library☆12Dec 7, 2024Updated last year
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆26Feb 4, 2026Updated last month