Just my findings of malwares
☆42Aug 26, 2022Updated 3 years ago
Alternatives and similar repositories for Malware-IOCs
Users that are interested in Malware-IOCs are comparing it to the libraries listed below
Sorting:
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆10Mar 29, 2022Updated 3 years ago
- Vuln-dev environment for LuaJIT☆20Dec 30, 2022Updated 3 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- IOC Collection 2022☆57Mar 7, 2023Updated 2 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆15Sep 2, 2024Updated last year
- This tool parses NTDLL.DLL, extracts all the syscall numbers and helps in making direct syscalls, in order to help evasion.☆15Jun 6, 2022Updated 3 years ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆16May 13, 2018Updated 7 years ago
- Golang C2 and Beacon/Agent built from the ground up for scalability and expandability☆14Mar 16, 2021Updated 4 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Apr 10, 2022Updated 3 years ago
- ☆17Apr 18, 2023Updated 2 years ago
- Simple utility to watch directory change notifications on a given path☆20Oct 6, 2017Updated 8 years ago
- A C++/Asm template for PIC/EXE/DLL malware☆24Aug 12, 2025Updated 6 months ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Oct 15, 2022Updated 3 years ago
- Silly proof-of-concept for a PDF chatroom☆21May 3, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- A non-math, but still technical, guide to cryptography☆24Jul 24, 2020Updated 5 years ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- ☆52Apr 1, 2022Updated 3 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- Protected Process (Light) Dump: Uses Zemana AntiMalware Engine To Open a Privileged Handle to a PP/PPL Process And Inject MiniDumpWriteDu…☆25Mar 26, 2020Updated 5 years ago
- a collection of elf file infectors☆27Oct 10, 2021Updated 4 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- Windows Event Log Knowledge Base☆31Dec 23, 2025Updated 2 months ago
- ☆29Jan 15, 2021Updated 5 years ago
- ☆28Dec 16, 2023Updated 2 years ago
- Parse Microsoft shim databases☆32Jan 8, 2025Updated last year
- ☆32Mar 26, 2024Updated last year
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- ☆194Feb 6, 2024Updated 2 years ago