Kracken256 / dash-shell-rootkitLinks
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
☆11Updated 2 years ago
Alternatives and similar repositories for dash-shell-rootkit
Users that are interested in dash-shell-rootkit are comparing it to the libraries listed below
Sorting:
- Notes and IoCs of fresh malware☆59Updated last year
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆11Updated 3 years ago
- ☆28Updated 4 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- ☆34Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated last year
- My Malware Analysis Reports☆22Updated 3 years ago
- ☆66Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆39Updated 3 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Updated 9 months ago
- ☆85Updated 2 years ago
- Python wrappers for mal_unpack☆36Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- ☆27Updated 8 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Updated 2 years ago
- ☆17Updated 5 years ago
- ☆54Updated 7 months ago
- Repository of open source malware here on Github!☆44Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 8 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆25Updated 2 years ago
- ☆64Updated 3 years ago