alichtman / malware-techniques
A collection of techniques commonly used in malware to accomplish core tasks.
☆84Updated 5 years ago
Alternatives and similar repositories for malware-techniques:
Users that are interested in malware-techniques are comparing it to the libraries listed below
- Personal research and publication on malware families☆137Updated 4 months ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆43Updated 3 years ago
- ☆49Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆114Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆80Updated 7 months ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- ☆134Updated last month
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- A simple implant showcasing modern C++☆106Updated 4 years ago
- Ebfuscator: Abusing system errors for binary obfuscation☆52Updated 5 years ago
- x64 Windows Exploit Development☆110Updated 8 months ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆95Updated 2 years ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆180Updated 3 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A bunch of my exploit development helper tools, collected in one place.☆141Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆61Updated 4 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago