Lists (1)
Sort Name ascending (A-Z)
Stars
The samples referenced in my book, Evasive Malware (No starch Press)
Free educational content on reverse engineering and malware analysis from the FLARE team
Tool for solving BPF filters and crafting packets based on these.
MCP for Security: A collection of Model Context Protocol servers for popular security tools like SQLMap, FFUF, NMAP, Masscan and more. Integrate security testing and penetration testing into AI wor…
Terravision creates Professional Cloud Architecture Diagrams from your Terraform code automatically. Supports AWS, Google and Azure.
FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.
A Python package and CLI for parsing aggregate and forensic DMARC reports
Lightweight coding agent that runs in your terminal
Official Modding tools for Sins of a Solar Empire II. Provided by Ironclad Games and Stardock Entertainment.
Go HTTP client with browser-identical TLS/HTTP2 fingerprinting. Bypass bot detection by perfectly mimicking Chrome, Firefox, and Safari at the cryptographic level (JA3/JA4, Akamai fingerprint, head…
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
A sysmon configuration designed for monitoring RMM solutions from the LOLRMM framework on the OS Microsoft Windows. 10/11
A terminal application that simulates installing things but doesn't actually install anything
A Latex style and template for paper preprints (based on NIPS style)
A large collection of NES accuracy tests on a single NROM cartridge.
External monitoring for organization assets
RunPE implementation with multiple evasive techniques (2)
Actionable analytics designed to combat threats
wagov / IRM
Forked from certsocietegenerale/IRMIncident Response Methodologies 2022
Turn any webpage into structured data using LLMs
Bjorn is a powerful network scanning and offensive security tool for the Raspberry Pi with a 2.13-inch e-Paper HAT. It discovers network targets, identifies open ports, exposed services, and potent…
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Binary Ninja plugin to analyze and simplify obfuscated code
WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API
Tracking RISC-V Actions on Education, Training, Courses, Monitorships, etc.
All Algorithms implemented in Python
Make BASH stealthy and hacker friendly with lots of bash functions