Public malware techniques used in the wild: Virtual Machine, Emulation
Prevent UAC authorization of Chinese malware
The pattern matching swiss knife for malware researchers
A realtime malware scanner
A collection of software installations scripts for Windows systems
Anti-distillation for employee Skills
A binary authorization system for macOS
A collection of malware samples and relevant dissection information
Antivirus engine for detecting trojans, viruses and malware
Continuation of NetherSX2 based on AetherSX2 3668
A Minecraft bot for keep your Aternos server alive 24/7
An advanced memory forensics framework
Ghidra is a software reverse engineering (SRE) framework
An efficient blocker for Chromium and Firefox
Cromite a Bromite fork with ad blocking and privacy enhancements
receive an email when a file is accessed or modified on linux-unix
Desktop Telegram client with good customization and Ghost mode.
Ghostery Browser Extension for Firefox, Chrome, Opera and Edge
lightweight Go package to parse, analyze and extract metadata
AI Code Security Anti-Patterns distilled from 150+ sources
The original Tiny Claw as your personal autonomous AI companion
Repurpose Microsoft-trusted executables, service accounts, etc.
Linter for Postgres migrations & SQL
A web proxy tool