🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
-
Updated
Jan 27, 2025 - Python
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
🔒 Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories.
The Rogue Access Point Framework
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
An advanced memory forensics framework
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
Malicious traffic detection system
A True Instrumentable Binary Emulation Framework
FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Awesome hacking is an awesome collection of hacking tools.
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
Volatility 3.0 development
Interesting APT Report Collection And Some Special IOC
Malware Configuration And Payload Extraction
Binary instrumentation framework based on FRIDA
yarGen is a generator for YARA rules
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
ThePhish: an automated phishing email analysis tool
Malcom - Malware Communications Analyzer
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.