Repository of open source malware here on Github!
☆44Jan 11, 2022Updated 4 years ago
Alternatives and similar repositories for Open-source-Malware
Users that are interested in Open-source-Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆161Apr 6, 2026Updated 3 weeks ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 5 months ago
- Process Creation, Image Load and Thread Creation Notification☆12Sep 15, 2023Updated 2 years ago
- Field guide to gather low-hanging fruits☆15Mar 20, 2025Updated last year
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆145Feb 21, 2024Updated 2 years ago
- Ssdt Hook Detection tool☆13Nov 11, 2016Updated 9 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆794Feb 8, 2026Updated 2 months ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago
- Example code to use DRM KMS mode with dumbbuffer☆15Oct 8, 2014Updated 11 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Pacman Package Finder (In Dev)☆12Jan 8, 2025Updated last year
- Misc stuff from internet☆12Apr 13, 2026Updated 3 weeks ago
- ☆13Jan 4, 2022Updated 4 years ago
- Mochi is a proof-of-concept C++ loader that leverages the ChaiScript embedded scripting language to execute code.☆99Mar 27, 2022Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- MP3Tag scripts for pulling data from Metal Archives☆14May 17, 2025Updated 11 months ago
- ☆14Mar 20, 2026Updated last month
- ☆19Jan 31, 2025Updated last year
- This repository has been archived. Please use https://github.com/microsoft/InclusivenessAnalyzerVisualStudio Roslyn analyzer that provid…☆14Sep 20, 2022Updated 3 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆147May 23, 2022Updated 3 years ago