Showing 9 open source projects for "malware"

View related business solutions
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • Tool Tracking Made Simple Icon
    Tool Tracking Made Simple

    Use Phones to Track Tools - A simple app to turn your phone into a tool tracker.

    ShareMyToolbox is a tool tracking solution that enables companies to track individuals who are responsible for tools and small equipment. Mobile users are able to search the company tool inventory, request tools and accept tool assignments with Apple or Android devices such as phones or tablets. Built for contractors, the system was designed to be extremely easy to use.
    Learn More
  • 1
    Volatility

    Volatility

    An advanced memory forensics framework

    Volatility is a widely used open-source framework for analyzing memory captures (RAM dumps) from Windows, Linux, and macOS systems. It enables investigators and malware analysts to extract process lists, network connections, DLLs, strings, artifacts, and more. Volatility supports many plugins for detecting hidden processes, malware, rootkits, and event tracing. It’s essential in digital forensics and incident response workflows.
    Downloads: 148 This Week
    Last Update:
    See Project
  • 2
    Maltrail

    Maltrail

    Malicious traffic detection system

    Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything from domain name, URL, IP address (e.g. 185.130.5.231 for the known attacker) or HTTP User-Agent header value (e.g. sqlmap for automatic SQL injection and database takeover tool). Also, it uses (optional) advanced heuristic mechanisms that can help in the discovery of unknown threats (e.g. new malware). Sensor(s) is a standalone component running on the monitoring node (e.g. Linux platform connected passively to the SPAN/mirroring port or transparently inline on a Linux bridge) or at the standalone machine (e.g. Honeypot) where it "monitors" the passing Traffic for blacklisted items/trails (i.e. domain names, URLs and/or IPs).
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3
    DracOS GNU/Linux Remastered
    What is DracOS GNU/Linux Remastered ? DracOS GNU/Linux Remastered ( https://github.com/dracos-linux ) is the Linux operating system from Indonesia , open source is built based on Debian live project under the protection of the GNU General Public License v3.0. This operating system is one variant of Linux distributions, which is used to perform security testing (penetration testing). Dracos linux in Arm by hundreds hydraulic pentest, forensics and reverse engineering. Use a GUI-based...
    Downloads: 26 This Week
    Last Update:
    See Project
  • 4
    Text-ly

    Text-ly

    Text.ly - An alternative for Notepad.

    ...Just download and install and use as an alternative for typical Notepad. This application is compiled from the Pyinstaller library so don't mind there is a vulnerability or something the antivirus program might show it as malware or trojan this happens with most of the apps compiled from the Pyinstaller library. So No worries There is not any malware or virus in the app. the source code is available on GitHub you can simply checkout it. Thank you ...!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Effortlessly Manage Product Information Icon
    Effortlessly Manage Product Information

    OneTimePIM is a comprehensive Product Information Management System designed to streamline the import and distribution of product data.

    A single source of truth for all of your product information with easy ways to distribute that data to wherever it needs to go, including the most powerful e-commerce connectors in the industry.
    Learn More
  • 5
    Dr0p1t-Framework

    Dr0p1t-Framework

    A framework that create an advanced stealthy dropper

    Dr0p1t-Framework is a penetration testing tool designed to generate advanced and stealthy droppers capable of delivering and executing payloads on target systems while evading detection mechanisms. A dropper is a type of malware used to download and install additional malicious software, and this framework focuses on making that process more flexible and difficult to detect. It provides a wide range of modules that allow users to customize payload delivery, persistence mechanisms, and execution methods. The framework includes features such as antivirus evasion, privilege escalation, and system persistence, enabling it to maintain access on compromised systems. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Malware Classifier

    Malware Classifier

    Perform quick, easy classification of binaries for malware analysis.

    Adobe Malware Classifier is a command-line tool that lets antivirus analysts, IT administrators, and security researchers quickly and easily determine if a binary file contains malware, so they can develop malware detection signatures faster, reducing the time in which users' systems are vulnerable. Malware Classifier uses machine learning algorithms to classify Win32 binaries – EXEs and DLLs – into three classes: 0 for “clean,” 1 for “malicious,” or “UNKNOWN.” ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    FolderLockerExample

    FolderLockerExample

    EaseFilter Folder Locker Example

    EaseFilter Folder Locker is a Windows file and folder protection solution built on the EaseFilter File Control, Encryption and Process Filter Driver SDK. It lets you lock, hide, and restrict access to files and folders in real time to prevent unauthorized access or modification. With the folder locker you can prevent your protected files being read,written,deleted, renamed, copied out of the protected folder, allow you to authorize or deny the file access to specific user or process, also...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    File-Security-SDK

    File-Security-SDK

    EaseFilter Comprehensive File Security SDK

    The EaseFilter Filter Driver SDK is a collection of tools, libraries, and sample code designed to facilitate the creation of Windows file system filter drivers. These drivers operate at a low level, intercepting file I/O requests before they reach the underlying file system or other filter drivers. The EaseFilter SDK provides a powerful interface for developing Windows filter drivers in C++, C#, or other programming languages that support native DLL calls. This guide helps developers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    RegistryFilterExample

    RegistryFilterExample

    Registry Filter Driver SDK

    The EaseFilter Registry Filter Driver SDK is a powerful, kernel-mode development toolkit designed to help developers monitor, control, and protect Windows registry operations in real time. It enables the development of robust security, compliance, and system integrity solutions by intercepting and managing registry access before it reaches the Windows registry subsystem. The SDK allows your application to receive notifications before any registry operation is processed by the Windows...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Queue Management System for Busy Service Providers | WaitWell Icon
    Queue Management System for Busy Service Providers | WaitWell

    The queue management system that perfectly adapts to your workflows

    The queue management system that perfectly adapts to your workflows. Improve operational efficiency in weeks with the most configurable enterprise queue system.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB