Perfectdotexe / Perfect-Malware-Samples
Fresh malware samples caught in the wild daily from random places. π£
β18Updated 5 years ago
Related projects: β
- Sp00fer blog post -β25Updated 2 years ago
- Basic tool to automate backdooring PE filesβ54Updated 2 years ago
- This contains common OSCP local exploits and enumeration scriptsβ9Updated 9 years ago
- β21Updated this week
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ15Updated 4 years ago
- Automated Payload Test Controllerβ9Updated 7 years ago
- β14Updated this week
- Ransoblin (Ransomware Bokoblin)β17Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ14Updated 4 years ago
- Basic Binary Exploitation / Buffer Overflowsβ11Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by attaβ¦β22Updated 7 years ago
- β14Updated this week
- Malware campaigns and APTs research by BlackArrowβ17Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the inβ¦β17Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwritesβ29Updated 3 years ago
- The Hall of Ancient Exploitation Toolsβ16Updated 4 years ago
- β22Updated 2 years ago
- Simple C2 over the Trello APIβ37Updated last year
- β23Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigβ10Updated 4 years ago
- iOS malware samplesβ34Updated 8 years ago
- Shock the shell! Exploit many injection method for shellshockβ17Updated 6 years ago
- Scripts for OSCEβ18Updated 5 years ago
- β23Updated 4 years ago
- β11Updated 3 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.β21Updated 2 years ago
- β20Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Proβ¦β19Updated 3 years ago
- Script which is able to decrypt data sent to AzoRult 3.3 Serverβ11Updated 3 years ago
- Hunt and Analyze Tor Onion Sitesβ23Updated last year