Repository of open source malware here on Github!
☆44Jan 11, 2022Updated 4 years ago
Alternatives and similar repositories for Open-source-Malware
Users that are interested in Open-source-Malware are comparing it to the libraries listed below
Sorting:
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- ☆33Oct 25, 2021Updated 4 years ago
- Tutorials, tools, and more as related to reverse engineering video games.☆15Dec 19, 2017Updated 8 years ago
- Process Creation, Image Load and Thread Creation Notification☆13Sep 15, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Very tiny and selective implementation of STL for Windows NT kernel mode drivers☆18Jun 22, 2021Updated 4 years ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆144Feb 21, 2024Updated 2 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆776Feb 8, 2026Updated last month
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Collection of shellcode injection and execution techniques☆18Updated this week
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated last week
- ☆10Jan 30, 2022Updated 4 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- YouTube Ad Blocker Popup Removal is a Google Chrome extension that removes the annoying popup that appears when you try to skip an ad on …☆13Feb 14, 2025Updated last year
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- The Threat Actor Profile Guide for CTI Analysts☆117Jul 15, 2023Updated 2 years ago
- ☆11Feb 26, 2026Updated 3 weeks ago
- MP3Tag scripts for pulling data from Metal Archives☆14May 17, 2025Updated 10 months ago
- This repository has been archived. Please use https://github.com/microsoft/InclusivenessAnalyzerVisualStudio Roslyn analyzer that provid…☆14Sep 20, 2022Updated 3 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Collection of extracted Microsoft Defender data for security research purposes☆234Jun 23, 2022Updated 3 years ago