Public malware techniques used in the wild: Virtual Machine, Emulation
Prevent UAC authorization of Chinese malware
The pattern matching swiss knife for malware researchers
A realtime malware scanner
A collection of software installations scripts for Windows systems
Anti-distillation for employee Skills
A binary authorization system for macOS
A collection of malware samples and relevant dissection information
Continuation of NetherSX2 based on AetherSX2 3668
Antivirus engine for detecting trojans, viruses and malware
A Minecraft bot for keep your Aternos server alive 24/7
An advanced memory forensics framework
Ghidra is a software reverse engineering (SRE) framework
Cromite a Bromite fork with ad blocking and privacy enhancements
An efficient blocker for Chromium and Firefox
Desktop Telegram client with good customization and Ghost mode.
lightweight Go package to parse, analyze and extract metadata
Ghostery Browser Extension for Firefox, Chrome, Opera and Edge
AI Code Security Anti-Patterns distilled from 150+ sources
The original Tiny Claw as your personal autonomous AI companion
A web proxy tool
receive an email when a file is accessed or modified on linux-unix
Linter for Postgres migrations & SQL
Repurpose Microsoft-trusted executables, service accounts, etc.