Inquiry Deprecated[DEPRECATED]: Prefer Room by Google, or SQLDelight by Square.
Stars: ✭ 264 (-25%)
qweryA SQL-like language for performing ETL transformations.
Stars: ✭ 28 (-92.05%)
PreqlAn interpreted relational query language that compiles to SQL.
Stars: ✭ 257 (-26.99%)
CrypterCrypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Stars: ✭ 268 (-23.86%)
jifyJSON indexed file database/querying library/tool
Stars: ✭ 17 (-95.17%)
CryptskyA simple, fully python ransomware PoC
Stars: ✭ 304 (-13.64%)
SimpleatorSimpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (-26.14%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-74.15%)
VBoxCloakA PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;)
Stars: ✭ 49 (-86.08%)
MalsubA Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (-12.5%)
InfectpeInfectPE - Inject custom code into PE file [This project is not maintained anymore]
Stars: ✭ 266 (-24.43%)
FidlA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (-9.37%)
Graphql To MongodbAllows for generic run-time generation of filter types for existing graphql types and parsing client requests to mongodb find queries
Stars: ✭ 261 (-25.85%)
Phishing.databasePhishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Stars: ✭ 296 (-15.91%)
CommunityVolatility plugins developed and maintained by the community
Stars: ✭ 252 (-28.41%)
PhpmusselPHP-based anti-virus anti-trojan anti-malware solution.
Stars: ✭ 337 (-4.26%)
M-BotnetA C2 project that controls a self-propagating MS17-010 worm.
Stars: ✭ 39 (-88.92%)
Vxug PapersResearch code & papers from members of vx-underground.
Stars: ✭ 291 (-17.33%)
carrierwave-attachmentscannerAdds the ability to send CarrierWave uploads to Attachment Scanner for virus and malware prevention.
Stars: ✭ 14 (-96.02%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (-10.51%)
malware-s2eCode for my blog post on using S2E for malware analysis
Stars: ✭ 21 (-94.03%)
Adamantium Thief🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (-19.6%)
Misp GalaxyClusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (-21.59%)
MalwareDatabaseMalware samples for analysis, researchers, anti-virus and system protection testing.(1300+ Malware-samples!)
Stars: ✭ 21 (-94.03%)
ColdfireGolang malware development framework
Stars: ✭ 309 (-12.22%)
InvizzzibleInviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (-23.86%)
Android unpackerA (hopefully) generic unpacker for packed Android apps.
Stars: ✭ 320 (-9.09%)
Al KhaserPublic malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Stars: ✭ 3,573 (+915.06%)
LoukoumA simple SQL Query Builder
Stars: ✭ 305 (-13.35%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (-25%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (-3.12%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-25.28%)
Graphqurlcurl for GraphQL with autocomplete, subscriptions and GraphiQL. Also a dead-simple universal javascript GraphQL client.
Stars: ✭ 3,012 (+755.68%)
RoapiCreate full-fledged APIs for static datasets without writing a single line of code.
Stars: ✭ 253 (-28.12%)
ZelosA comprehensive binary emulation and instrumentation platform.
Stars: ✭ 298 (-15.34%)
TeleShadow2TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (-75%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-92.33%)
Ghostshell Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
Stars: ✭ 293 (-16.76%)
YobiYara Based Detection Engine for web browsers
Stars: ✭ 39 (-88.92%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-11.36%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (-7.1%)
MedusaBinary instrumentation framework based on FRIDA
Stars: ✭ 258 (-26.7%)
RansomwareCrypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
Stars: ✭ 19 (-94.6%)
MalconfscanVolatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (-7.1%)
KeyPlexerCapstone: Keylogger Trojan
Stars: ✭ 32 (-90.91%)
DatafunResearch on integrating datalog & lambda calculus via monotonicity types
Stars: ✭ 287 (-18.47%)
kubesqlA tool based on presto using sql to query the resources of kubernetes, such as pods, nodes and so on.
Stars: ✭ 56 (-84.09%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+1537.22%)
Nt wrapperA wrapper library around native windows sytem APIs
Stars: ✭ 287 (-18.47%)
HijackthisA free utility that finds malware, adware and other security threats
Stars: ✭ 349 (-0.85%)
GonnacryA Linux Ransomware
Stars: ✭ 341 (-3.12%)
Hosts🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
Stars: ✭ 19,363 (+5400.85%)
Ir RescueA Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (-11.65%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (-19.03%)