Sources code extracted from malwares for analysis
☆40Mar 10, 2023Updated 2 years ago
Alternatives and similar repositories for Cerberus
Users that are interested in Cerberus are comparing it to the libraries listed below
Sorting:
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Mar 2, 2021Updated 4 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Apk infector && Frida injector☆23Jul 25, 2024Updated last year
- Source code RDPUploader☆19Dec 27, 2018Updated 7 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- ☆537Feb 19, 2026Updated last week
- This is a CS project that will encrypt shell code from msfvenom using AES☆23Mar 24, 2022Updated 3 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 4 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- My Malware Analysis Reports☆25May 24, 2022Updated 3 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Feb 19, 2021Updated 5 years ago
- Malware-Analysis-Kit☆14Aug 3, 2015Updated 10 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆15Sep 21, 2020Updated 5 years ago
- https://anonfiles.com/Nde4I9F9x1/FraudFoxWin11_zip☆12Feb 4, 2022Updated 4 years ago
- webshell golang implementation☆10Dec 26, 2019Updated 6 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆125May 15, 2023Updated 2 years ago