5kidRo0t / Malware_AnalysisLinks
☆10Updated 2 months ago
Alternatives and similar repositories for Malware_Analysis
Users that are interested in Malware_Analysis are comparing it to the libraries listed below
Sorting:
- An open-source .NET Ransomware☆24Updated 4 years ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated last year
- 「💽」MBR Overwrite malware for linux☆28Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- Live malware samples and database, daily update.☆31Updated 9 months ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆84Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆43Updated 3 months ago
- just a buncha stuff i made☆12Updated 2 years ago
- Malware and malicious applications database☆38Updated last year
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Actual real-world ransomware coded in WinAPI C++ with the help of the Cryptography API made to encrypt a whole Windows installation☆10Updated 2 years ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆49Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆117Updated last week
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 7 months ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated 2 years ago
- Powerful windows malware with many features☆17Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- ⚠️ Malware Development training ⚠️☆40Updated 11 months ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆30Updated last year
- A command-line tool written in Python 3 to download files from VirusTotal☆15Updated 6 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Updated 3 years ago
- POC | Steal user WhatsApp information/data☆75Updated 8 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago