Found resources in my malware researching adventure.
☆17Dec 18, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-Research-Valuable-Resources
Users that are interested in Malware-Research-Valuable-Resources are comparing it to the libraries listed below
Sorting:
- Dataset of packed ELF samples☆20Jan 24, 2026Updated last month
- A compilation of resources for studying for the eCPPTv2☆16Sep 28, 2022Updated 3 years ago
- deep learning, malware detection, predictive uncertainty, dataset shift, calibration, uncertainty quantification, android malware☆16Nov 30, 2021Updated 4 years ago
- ☆15Feb 17, 2021Updated 5 years ago
- just for fun☆18Jan 21, 2025Updated last year
- Resources for CompTIA Security+ SY0-601 and related topics☆23Apr 27, 2024Updated last year
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- WADark - Whatsapp Phishing Tool via OTP Code☆40Sep 17, 2024Updated last year
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- Old and new CTFs about Linux kernel exploitation.☆64Mar 28, 2022Updated 3 years ago
- Grepolis tools, scripts and bots☆12May 19, 2023Updated 2 years ago
- ☆12Updated this week
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- Introduction to Python, Green Data Science, ISA, ULisboa☆11Dec 11, 2025Updated 2 months ago
- Squeezeboxプラグイン☆13Updated this week
- eLearnSecurity Mobile Application Penetration Tester (eMAPT)☆34Feb 6, 2024Updated 2 years ago
- This contains notes, slides, and code for my Strange Loop talk☆31Sep 22, 2023Updated 2 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Jun 4, 2025Updated 9 months ago
- pongoOS☆10Feb 15, 2024Updated 2 years ago
- ☆12Feb 27, 2026Updated last week
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 6 months ago
- List of OSINT Repositories starred from GitHub (limited access version)☆72Feb 27, 2026Updated last week
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- stmctf22☆35Nov 16, 2022Updated 3 years ago
- Reverse engineered Hyundai Kona Electric CAN signal database☆17Jan 16, 2025Updated last year
- ☆12Aug 5, 2025Updated 7 months ago
- Support EMCRs to develop their computing skills☆12Feb 23, 2026Updated 2 weeks ago
- 👶🏻😿 A zero-dependency network sniffer, written from scratch, that supports emulated and native cBPF. Runs on Linux, BSD, macOS and Win…☆13Nov 8, 2025Updated 4 months ago
- 2024 - CANCELED AT REQUEST OF SAMSUNG. This Magisk Module was going to attempt to add missing engineering/combination framework to the de…☆11Jul 18, 2024Updated last year
- ☆11Dec 2, 2025Updated 3 months ago
- Patch files☆10Aug 8, 2022Updated 3 years ago
- Gootool for Android☆13Jul 21, 2023Updated 2 years ago
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- A little bit of help.☆14Jul 25, 2024Updated last year
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Feb 3, 2021Updated 5 years ago
- ADB Usage Complete / ADB 用法大全☆12Jan 17, 2022Updated 4 years ago
- Quickly Access and Infiltrate ADB Devices With Shodan API☆11Jul 27, 2025Updated 7 months ago