NomanProdhan / malbuzzLinks
It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all other samples using YARA rules, CalmAV signatures, etc. This tool is based on MalwareBazaar.
☆20Updated 2 months ago
Alternatives and similar repositories for malbuzz
Users that are interested in malbuzz are comparing it to the libraries listed below
Sorting:
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- ☆35Updated last year
- ECC Public Key Cryptography☆38Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 weeks ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago
- ☆25Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆36Updated 2 years ago
- Cobalt Strike BOFS☆16Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆21Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆52Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- A Red Teaming tool focused on profiling the target.☆27Updated 3 months ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- Yet Another Memory Analyzer for malware detection☆24Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- ☆32Updated 2 years ago