Aldenar / salt-malware-sources
Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analysis of other infected machines
☆13Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for salt-malware-sources
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 10 months ago
- A tool to run a command when the target of a symlink changes☆15Updated 8 years ago
- A list of backdoor samples I find online.☆13Updated 4 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Open YARA scan- and search engine☆17Updated last week
- vyos based isolation of networks☆11Updated 4 years ago
- Setting up a training environment for MISP☆11Updated last year
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Updated last year
- the puppy proxy☆22Updated 4 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆32Updated 6 months ago
- Hackers Don't Give A Shit☆15Updated 4 years ago
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Custom semgrep rules registry☆12Updated 2 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆38Updated 4 years ago
- Fork of https://github.com/PortSwigger/param-miner for header smuggling research☆12Updated 3 years ago
- Man-in-the-middle TLS intercept proxy with tcpdumpable loopback☆23Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 3 years ago
- ☆16Updated 4 years ago
- Collect autorun records from running system☆59Updated 2 years ago
- Download a Bunch of Malware for Demos and Testing☆13Updated 6 years ago
- egrets monitors egress☆45Updated 4 years ago
- ☆24Updated last year