Public malware techniques used in the wild: Virtual Machine, Emulation
Prevent UAC authorization of Chinese malware
The pattern matching swiss knife for malware researchers
A collection of software installations scripts for Windows systems
A realtime malware scanner
A binary authorization system for macOS
Anti-distillation for employee Skills
Continuation of NetherSX2 based on AetherSX2 3668
A Minecraft bot for keep your Aternos server alive 24/7
Antivirus engine for detecting trojans, viruses and malware
A collection of malware samples and relevant dissection information
Ghidra is a software reverse engineering (SRE) framework
Cromite a Bromite fork with ad blocking and privacy enhancements
An efficient blocker for Chromium and Firefox
An advanced memory forensics framework
Desktop Telegram client with good customization and Ghost mode.
Ghostery Browser Extension for Firefox, Chrome, Opera and Edge
AI Code Security Anti-Patterns distilled from 150+ sources
lightweight Go package to parse, analyze and extract metadata
A web proxy tool
The original Tiny Claw as your personal autonomous AI companion
Repurpose Microsoft-trusted executables, service accounts, etc.
receive an email when a file is accessed or modified on linux-unix
Never get AFK kicked from Roblox again!