StrangerealIntel / CerberusLinks
Sources code extracted from malwares for analysis
☆39Updated 2 years ago
Alternatives and similar repositories for Cerberus
Users that are interested in Cerberus are comparing it to the libraries listed below
Sorting:
- ☆23Updated 5 years ago
- ☆50Updated 5 years ago
- A small utility to deal with malware embedded hashes.☆52Updated last year
- QuasarRAT analysis tools and research report☆27Updated last year
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- Experiments on the Windows Internals☆30Updated 5 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- ☆27Updated 5 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- A repository where I share my injection implemintations☆29Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆53Updated 6 years ago
- Automate AV evasion by calling AMSI☆86Updated 2 years ago
- Red Team C2 and Post Exploitation code☆37Updated 2 months ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- ProcDot Malware Sandbox☆24Updated last month
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Updated 6 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆29Updated 6 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago