Skip to content
View brkalbyrk7's full-sized avatar

Block or report brkalbyrk7

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

A Binary Genetic Traits Lexer Framework

Rust 487 54 Updated Feb 23, 2025

Evasion by machine code de-optimization.

Rust 370 24 Updated Jul 22, 2024

Production-ready detection & response queries for osquery

Makefile 547 37 Updated Feb 26, 2025

Real-time, container-based file scanning at enterprise scale

Python 907 121 Updated Feb 26, 2025

get things from one computer to another, safely

Python 20,913 671 Updated Mar 3, 2025

An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).

C 780 44 Updated Feb 2, 2024

Obfuscate Go builds

Go 4,373 275 Updated Feb 22, 2025

MemProcFS

C 3,395 425 Updated Mar 1, 2025

Platform for Architecture-Neutral Dynamic Analysis

C 2,552 484 Updated Mar 3, 2025

Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.

258 36 Updated Jan 20, 2025

.NET Assembly Dumper

C# 878 194 Updated Feb 2, 2023

bash script for Subdomain Enumeration

Shell 350 65 Updated Feb 11, 2025

If your data is messy - Use Shmessy!

Python 28 1 Updated Jun 27, 2024

Suricata rules for network anomaly detection

156 43 Updated Feb 18, 2025

🍯 T-Pot - The All In One Multi Honeypot Platform 🐝

C 7,478 1,162 Updated Mar 3, 2025

Tracking interesting Linux (and UNIX) malware. Send PRs

HTML 1,170 95 Updated Feb 21, 2025

TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.

527 58 Updated Mar 5, 2025

A centralized and enhanced memory analysis platform

TypeScript 432 47 Updated Feb 3, 2025

Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).

C++ 3,236 442 Updated Feb 27, 2025

For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots.

680 191 Updated Feb 20, 2025

Collection of links on bad opsec

91 8 Updated May 31, 2024

A VBA parser and emulation engine to analyze malicious macros.

Python 1,075 186 Updated Jul 10, 2024

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifyin…

932 85 Updated Jan 21, 2025

YARA malware query accelerator (web frontend)

Python 421 77 Updated Feb 28, 2025

Transparent SSL/TLS proxy for decrypting and diverting network traffic to other programs, such as UTM services, for deep SSL inspection

C 414 103 Updated Dec 19, 2024

TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and gather useful channel information easily.

Python 413 51 Updated Jun 15, 2024

Java decompiler, assembler, and disassembler

Rust 2,026 225 Updated Feb 1, 2025

Set of tools to analyze Windows sandboxes for exposed attack surface.

C# 2,123 438 Updated Dec 4, 2024

This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.

C 546 87 Updated Jan 13, 2024

This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to …

C 629 75 Updated Jul 6, 2024