alichtman / malware-techniques
A collection of techniques commonly used in malware to accomplish core tasks.
☆85Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for malware-techniques
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- Personal research and publication on malware families☆137Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 5 years ago
- ☆47Updated last year
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆89Updated last year
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆124Updated 11 months ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- Malware captured with honeypots☆35Updated 7 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆178Updated 2 years ago
- ☆294Updated 2 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 2 months ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆61Updated 5 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆111Updated last year
- ☆131Updated last year
- macOS Offensive Tools☆261Updated last year
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- An attempt to restore and adapt to modern Win10 version the 'Rootkit Arsenal' original code samples☆66Updated 2 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆386Updated 4 months ago
- A bunch of my exploit development helper tools, collected in one place.☆139Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆139Updated 3 years ago
- Exploit Development, Reverse Engineering & Cryptography☆246Updated 4 years ago