Contains Actual Events and Codes of Threat Groups, APTs, Research Groups
☆19Sep 10, 2022Updated 3 years ago
Alternatives and similar repositories for CODE_OF_MALWARE_I
Users that are interested in CODE_OF_MALWARE_I are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 22, 2022Updated 3 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Just my findings of malwares☆42Aug 26, 2022Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Exploit scripts☆12Apr 10, 2022Updated 4 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Jan 8, 2023Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- dump lsass tool☆38Oct 10, 2022Updated 3 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- This sample shows how to use Bicep to create an Azure Private Link Service that can be accessed by a third party via an Azure Private End…☆11Jul 1, 2022Updated 3 years ago
- A click-friendly infograph that helps you to understand Microsoft Intune [Windows Platform] better and directs you to the related Microso…☆40Apr 17, 2023Updated 3 years ago
- Frontend for MalShare.com☆18Apr 25, 2026Updated last week
- HTTP(S) directory/file brute forcer☆21Feb 22, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A browser based visualization of domain trusts. Give it a csv, get a pretty diagram to play with!☆19Jun 16, 2019Updated 6 years ago
- ☆166Nov 6, 2022Updated 3 years ago
- ☆20Nov 1, 2022Updated 3 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆90Nov 9, 2023Updated 2 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- Recordization library☆11Apr 8, 2026Updated 3 weeks ago