Kracken256 / dash-shell-rootkitLinks
Dash rootkit. Linux Trojan Backdoor. (MALWARE)
☆11Updated 2 years ago
Alternatives and similar repositories for dash-shell-rootkit
Users that are interested in dash-shell-rootkit are comparing it to the libraries listed below
Sorting:
- Notes and IoCs of fresh malware☆61Updated last year
- ☆28Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Updated 4 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆31Updated 3 years ago
- ProcDot Malware Sandbox☆26Updated 6 months ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Updated 2 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Command-line tool to search for malware samples in various repositories☆12Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Updated 4 years ago
- Python wrappers for mal_unpack☆37Updated 2 years ago
- ☆36Updated 3 years ago
- ☆16Updated 5 years ago
- Trojan written in C++ for Windows☆20Updated last year
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- "ImpELF: A Python-based ELF hashing utility that generates unique fingerprints for ELF binaries using their imported functions and librar…☆15Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 3 years ago
- ☆66Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- ☆44Updated 2 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- ☆27Updated 3 years ago
- ☆86Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- My Malware Analysis Reports☆25Updated 3 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago