alexandreborges / malware-1Links
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.
☆87Updated 8 years ago
Alternatives and similar repositories for malware-1
Users that are interested in malware-1 are comparing it to the libraries listed below
Sorting:
- Well, I have created this shit for educational pruposes (I think)☆37Updated 3 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- Android malware sample library.☆69Updated 3 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆130Updated 4 years ago
- ☆27Updated 4 years ago
- Warning! This repository contains samples of ransomware.☆93Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 4 years ago
- ☆123Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆18Updated 4 years ago
- Just another collection of links, tools, reports and other stuff☆25Updated 4 years ago
- Research tools for analysing Cerberus banking trojan.☆129Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆87Updated 2 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆40Updated 11 months ago
- Personal research and publication on malware families☆140Updated 9 months ago
- Resources for learning malware analysis and reverse engineering☆135Updated last year
- Bringing you the best of the worst files on the Internet.☆333Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 2 years ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆90Updated 4 years ago
- Reversed source code to the Babuk ransomware builder.☆18Updated 4 years ago
- An advanced Ransomware written in C++ and fully customizable☆93Updated 2 years ago
- A collection of malwares found on the internet.☆63Updated 2 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Updated 2 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆30Updated 5 years ago
- Small collection of Ransomware organized by family.☆254Updated last year
- Malware Analysis Tools☆30Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 5 years ago