VentressAsajj / MalwareView external linksLinks
Recopilación de enlaces para análisis de Malware. También se realizará descarga de automática, worlflows, de los feeds para crear un repositorio de feeds.
☆31Feb 8, 2026Updated last week
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Feb 18, 2023Updated 2 years ago
- Open-Source Ransomware As A Service for Linux, MacOS and Windows☆15Dec 20, 2020Updated 5 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- Menú de herramientas para análisis de malware y virus informáticos.☆19Feb 3, 2026Updated last week
- Unauthenticated Sqlinjection that leads to dump data base but this one impersonated Admin and drops a interactive shell☆23Jan 13, 2022Updated 4 years ago
- a small wiper malware programmed in c#☆59Nov 17, 2022Updated 3 years ago
- Intentionally Vulnerable to Spring4Shell☆52Apr 1, 2022Updated 3 years ago
- Distrubición Linux para Osint☆56Sep 9, 2018Updated 7 years ago
- Apache CouchDB 3.2.1 - Remote Code Execution (RCE)☆29May 20, 2022Updated 3 years ago
- Domain Blocklist☆10Aug 21, 2024Updated last year
- This project demonstrates function-calling with Python and Ollama, utilizing the Africa's Talking API to send airtime and messages to pho…☆18Updated this week
- CEH v13 i-labs , CEH v13 Engage Answers☆30Jul 5, 2025Updated 7 months ago
- iOS malware samples☆43May 13, 2016Updated 9 years ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆95Dec 14, 2025Updated 2 months ago
- Config files for my GitHub profile.☆31Jan 15, 2026Updated last month
- Herramienta que automatiza el uso del hashcat para crackear contraseñas☆13Oct 23, 2020Updated 5 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- UWPStation is an app that looks like VMware Workstation.☆10Jul 1, 2024Updated last year
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- 100% JavaScript implementation of Web SQL API☆20May 3, 2014Updated 11 years ago
- Convert Image to Cartoon Demo:☆15Jun 27, 2020Updated 5 years ago
- ccm - A small python library that helps identify vulnerabilities inside of encrypted data☆11Aug 17, 2020Updated 5 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- City Facility TV Displays☆12Nov 6, 2025Updated 3 months ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- 一个可以全端口捕获流量的简易蜜罐 tcppc: A simple honeypot to capture TCP/TLS/UDP payloads on ALL ports.☆13Aug 3, 2022Updated 3 years ago
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Sudo exploit☆12Oct 15, 2019Updated 6 years ago
- A simple application to keep on an eye on the availability of HTTP sites☆15Oct 10, 2023Updated 2 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- This repository contains instructions for fast-forward Raspberry Pi setup with Raspbian without a monitor and keyboard - just a network c…☆16Apr 9, 2014Updated 11 years ago
- This is the gandcrab v5.0.3 javascript dropper☆10Apr 29, 2020Updated 5 years ago
- 基于upx的SM4加密壳☆10May 12, 2023Updated 2 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago