Threatpursuit VmThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 814 (-21.2%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-40.85%)
SimplifyAndroid virtual machine and deobfuscator
Stars: ✭ 3,865 (+274.15%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+457.89%)
PafishPafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Stars: ✭ 2,026 (+96.13%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-92.35%)
AptmapA map displaying threat actors from the misp-galaxy
Stars: ✭ 17 (-98.35%)
OpenctiAuthors
Stars: ✭ 2,165 (+109.58%)
pyFireEyePython API bindings for FireEye Products
Stars: ✭ 12 (-98.84%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-85.19%)
showstopperShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (-87.22%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (-96.22%)
ShitVM가벼운 가상머신
Stars: ✭ 14 (-98.64%)
appdata-environment-desktopA selection of script and the manual for Privacy International's data interception environment
Stars: ✭ 70 (-93.22%)
TWVMA tiny, lightweight and efficient WebAssembly virtual machine.
Stars: ✭ 105 (-89.84%)
misp-packerBuild Automated Machine Images for MISP
Stars: ✭ 25 (-97.58%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (-70.47%)
EEL VMEEL2 compiler and execution VM with enhanced routines for real-time signal processing
Stars: ✭ 27 (-97.39%)
JustEvadeBroJustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
Stars: ✭ 63 (-93.9%)
vmThe mm-ADT Virtual Machine
Stars: ✭ 29 (-97.19%)
fame modulesCommunity modules for FAME
Stars: ✭ 55 (-94.68%)
awesome-intelligence-writingAwesome collection of great and useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles
Stars: ✭ 285 (-72.41%)
dig-into-apolloApollo notes (Apollo学习笔记) - Apollo learning notes for beginners.
Stars: ✭ 1,786 (+72.89%)
dev-cyberNot the device we need, but the one we deserve
Stars: ✭ 19 (-98.16%)
nntrainerNNtrainer is Software Framework for Training Neural Network Models on Devices.
Stars: ✭ 92 (-91.09%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-95.64%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-93.32%)
c8cThe chip8 compiler, assembler, and virtual machine
Stars: ✭ 110 (-89.35%)
ArminC-uBlock-Settings⚙️ ArminC's settings for uBlock₀ - remove most of the ads, pop-ups and trackers.
Stars: ✭ 24 (-97.68%)
openj9Eclipse OpenJ9: A Java Virtual Machine for OpenJDK that's optimized for small footprint, fast start-up, and high throughput. Builds on Eclipse OMR (https://github.com/eclipse/omr) and combines with the Extensions for OpenJDK for OpenJ9 repo.
Stars: ✭ 2,973 (+187.8%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-97.39%)
jitanaA graph-based static-dynamic hybrid DEX code analysis tool
Stars: ✭ 35 (-96.61%)
Arduino-ShellRPN Postscript/Forth Command Shell for Arduino
Stars: ✭ 19 (-98.16%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (-70.67%)
SBTCVM-Gen2-9SBTCVM is a virtual machine implementation of a balanced ternary (base 3) computer. Features several compiled languages for ternary software development.
Stars: ✭ 32 (-96.9%)
dga-collectionA collection of known Domain Generation Algorithms
Stars: ✭ 61 (-94.09%)
wavmWait, another virtual machine ?
Stars: ✭ 61 (-94.09%)
butterflyButterfly connects Virtual Machines and control their traffic flow
Stars: ✭ 48 (-95.35%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (-89.45%)
mimaMIninmal MAchine Assembler and Simulator
Stars: ✭ 19 (-98.16%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (-73.86%)
vagrant-try-alertaVagrant Boxes of alerta with other popular monitoring tools eg. Nagios, Riemann, Zabbix, Sensu, Kibana
Stars: ✭ 16 (-98.45%)
wa-avd-dockerA Docker image based on Ubuntu Desktop with VNC and noVNC access, that runs a lightweight Android Virtual Device with WhatsApp pre-installed.
Stars: ✭ 113 (-89.06%)
UnpackersMy collection of unpackers for malware packers/crypters
Stars: ✭ 25 (-97.58%)
cif-v5The FASTEST way to consume threat intel.
Stars: ✭ 53 (-94.87%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-97.48%)
thislangA subset of javascript implemented in that subset of javascript. Yes, it can run itself.
Stars: ✭ 31 (-97%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (-90.9%)
TurboDataMinerThe objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of information from the Burp Suite project as well as the flexible and dynamic on-the-fly modification of outgoing or incoming HTTP requests using Python scripts. Thus, Turbo Data Miner shall aid in gaining a better and fas…
Stars: ✭ 46 (-95.55%)
grimoireA fast, concurrent based scripting language for D.
Stars: ✭ 21 (-97.97%)
CyberPunkNetrunnerCyberpunk 2077 Netrunner Hacking Tool (Easy to use and install). Don't use it on illegal and malicious activity. Inspired by the game CyberPunk 2077 https://www.cyberpunk.net/
Stars: ✭ 69 (-93.32%)
myshoesAuto-scaling VirtualMachine runner 🏃 for GitHub Actions
Stars: ✭ 68 (-93.42%)
Scambaiting-SetupA full setup guide for scam-baiting with Oracle's VirtualBox.
Stars: ✭ 232 (-77.54%)
CS Book🔥 Latest computer science e-books。提供最新技术类电子书下载, “我无非就是想卷死各位,或者被各位卷死!”
Stars: ✭ 40 (-96.13%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (-71.25%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (-12.1%)