REal0day / MaliciousParkView external linksLinks
Another Repo of Malware. Enjoy. <3
☆60Feb 27, 2019Updated 6 years ago
Alternatives and similar repositories for MaliciousPark
Users that are interested in MaliciousPark are comparing it to the libraries listed below
Sorting:
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Windows 10 Exploit☆30Oct 29, 2018Updated 7 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated last month
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- ☆16May 9, 2016Updated 9 years ago
- A project that aims to automatically devirtualize code that has been virtualized using x86virt☆126Dec 3, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- ☆13Oct 19, 2022Updated 3 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Jun 12, 2015Updated 10 years ago
- Linux backdoor using ICMP payload for activation☆11Nov 18, 2014Updated 11 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- A bootkit to bypass Windows login (WIP)☆10Oct 25, 2023Updated 2 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- A tiny PoC to inject and execute code into explorer.exe with WM_SETTEXT+WM_COPYDATA+SetThreadContext☆53Apr 29, 2018Updated 7 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 8 years ago
- 010 Editor Template for parsing VMware Disk(vmdk) images☆16Sep 12, 2018Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Mar 11, 2021Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated 10 months ago
- 🦑 A friendly Ruby API to iptables.☆15May 6, 2017Updated 8 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Improves Ubuntu security feed compatibility allowing it to be consumed by Debian vulnerability report tool, debsecan.☆12May 30, 2021Updated 4 years ago