alichtman / malware-techniquesLinks
A collection of techniques commonly used in malware to accomplish core tasks.
☆83Updated 6 years ago
Alternatives and similar repositories for malware-techniques
Users that are interested in malware-techniques are comparing it to the libraries listed below
Sorting:
- Personal research and publication on malware families☆140Updated 8 months ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆54Updated 6 years ago
- repository of tools & resources of the MMD team☆134Updated 3 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated last year
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆87Updated 2 years ago
- x64 Windows Exploit Development☆113Updated last year
- PoC Thread Execution Hijacking for Win32 Code Injection☆179Updated last year
- ☆51Updated 2 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆97Updated 2 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆74Updated 5 years ago
- Golang ransomware☆47Updated 4 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 5 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- ☆27Updated 2 years ago
- CLI tool to analyze PE files☆88Updated 11 months ago
- Demonstrate about file-less malware approach using JavaScript☆55Updated 8 years ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 3 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool …☆28Updated 5 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Updated 6 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆130Updated last year
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago