Public malware techniques used in the wild: Virtual Machine, Emulation
Prevent UAC authorization of Chinese malware
The pattern matching swiss knife for malware researchers
A collection of software installations scripts for Windows systems
A realtime malware scanner
Anti-distillation for employee Skills
A binary authorization system for macOS
A collection of malware samples and relevant dissection information
Antivirus engine for detecting trojans, viruses and malware
Continuation of NetherSX2 based on AetherSX2 3668
An advanced memory forensics framework
A Minecraft bot for keep your Aternos server alive 24/7
An efficient blocker for Chromium and Firefox
Ghidra is a software reverse engineering (SRE) framework
lightweight Go package to parse, analyze and extract metadata
Repurpose Microsoft-trusted executables, service accounts, etc.
Cromite a Bromite fork with ad blocking and privacy enhancements
Ghostery Browser Extension for Firefox, Chrome, Opera and Edge
Desktop Telegram client with good customization and Ghost mode.
Linter for Postgres migrations & SQL
A web proxy tool
AI Code Security Anti-Patterns distilled from 150+ sources
Insular email distribution - mail server as Docker images