A full analysis report detailing as much as possible of a Malware or a Threat
☆31Jan 30, 2026Updated last month
Alternatives and similar repositories for Malware-Threat-Reports
Users that are interested in Malware-Threat-Reports are comparing it to the libraries listed below
Sorting:
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated last month
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 9 months ago
- A collection of random small Aggressor snippets that don't warrant their own repo☆25Mar 23, 2023Updated 2 years ago
- A PoC of Stack encryption prior to custom sleeping by leveraging CPU cycles.☆66May 2, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- ☆17May 28, 2022Updated 3 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- Delphi-Kawaii is a plugin for Ida Pro.☆22Jul 19, 2023Updated 2 years ago
- Các IDA Flirt signatures HTC tạo☆20Oct 21, 2024Updated last year
- ☆25Jul 12, 2023Updated 2 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- BE-PUM (Binary Emulation for PUshdown Model) is a project for analyzing and detecting binary files. Its main focus is on generating CFG (…☆20Dec 25, 2017Updated 8 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Winsocket for Cobalt Strike.☆104Jul 6, 2023Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Sep 8, 2022Updated 3 years ago
- Memory Scaner☆65Sep 9, 2022Updated 3 years ago
- VinCSS Reverse Engineering, Malware Analysing Tools & Ultilities☆27Nov 26, 2021Updated 4 years ago
- ☆105Jul 11, 2024Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated last month
- Modified python version of Rolf Rolles' https://github.com/RolfRolles/HexRaysDeob to unflatten Emotet'S Control Flow Flattening☆27May 5, 2022Updated 3 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Jun 6, 2023Updated 2 years ago
- ☆23May 23, 2024Updated last year
- HomeLab Setup with a Firewall, SIEM Solution, Exploitable machines and Attacker.☆31Jul 20, 2022Updated 3 years ago
- ☆24Feb 7, 2025Updated last year
- ☆34Jun 13, 2023Updated 2 years ago