Perfectdotexe / Perfect-Malware-Samples
Fresh malware samples caught in the wild daily from random places. π£
β18Updated 5 years ago
Alternatives and similar repositories for Perfect-Malware-Samples:
Users that are interested in Perfect-Malware-Samples are comparing it to the libraries listed below
- Sources Codes of many Office Malwaresβ16Updated 2 years ago
- Automated Payload Test Controllerβ9Updated 7 years ago
- Machine Learning basics with phishing datasetβ11Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.β22Updated 3 years ago
- Exploit for win10 SMB3.1β17Updated 5 years ago
- β11Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloadsβ26Updated 3 years ago
- Hunt and Analyze Tor Onion Sitesβ23Updated 2 years ago
- Work in Progress repoβ14Updated 6 years ago
- β12Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its eventsβ15Updated 5 years ago
- β27Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weirdβ22Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)β18Updated 4 years ago
- buffer overflow examplesβ22Updated 7 years ago
- Basic tool to automate backdooring PE filesβ55Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blogβ13Updated 5 years ago
- β16Updated 6 years ago
- β24Updated 2 years ago
- β26Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.β12Updated 6 years ago
- β20Updated 4 years ago
- β23Updated 4 years ago
- β14Updated 5 years ago
- Malware campaigns and APTs research by BlackArrowβ18Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.β20Updated 3 years ago
- Catalog Red Team techniques that cause popups in various macOS versionsβ14Updated 5 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β19Updated 4 years ago