Kracken256 / dash-shell-rootkitLinks
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
☆11Updated 2 years ago
Alternatives and similar repositories for dash-shell-rootkit
Users that are interested in dash-shell-rootkit are comparing it to the libraries listed below
Sorting:
- Notes and IoCs of fresh malware☆59Updated last year
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 4 years ago
- ☆27Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆47Updated 8 years ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- ☆36Updated 2 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Collaborative malware exchange repository.☆34Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- ☆26Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Updated 3 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ProcDot Malware Sandbox☆25Updated 4 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- My Malware Analysis Reports☆24Updated 3 years ago
- ☆20Updated 4 years ago
- Trojan written in C++ for Windows☆19Updated last year
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year