alichtman / malware-techniques
A collection of techniques commonly used in malware to accomplish core tasks.
☆86Updated 5 years ago
Alternatives and similar repositories for malware-techniques:
Users that are interested in malware-techniques are comparing it to the libraries listed below
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆43Updated 2 years ago
- Personal research and publication on malware families☆137Updated last month
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- ☆47Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- Resources for learning malware analysis and reverse engineering☆105Updated 11 months ago
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆178Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆112Updated last year
- ☆131Updated last year
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆29Updated 4 years ago
- x64 Windows Exploit Development☆110Updated 5 months ago
- Malware Analysis Tools☆30Updated 5 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 5 years ago
- king of the hill cybersecurity competition☆27Updated 2 years ago
- Code snippets for bare-metal malware development☆97Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆125Updated last year
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- Extensible Red Team Framework☆111Updated 5 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 4 years ago
- 0xpat blog☆100Updated 3 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 4 months ago
- A bunch of my exploit development helper tools, collected in one place.☆140Updated 2 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆91Updated 2 years ago
- Research on Anti-malware and other related security solutions☆259Updated 4 years ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- ☆37Updated 3 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆140Updated 3 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago