A collection of techniques commonly used in malware to accomplish core tasks.
☆83Jun 15, 2019Updated 6 years ago
Alternatives and similar repositories for malware-techniques
Users that are interested in malware-techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 6 years ago
- Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.☆102Dec 17, 2017Updated 8 years ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Set of antianalysis techniques found in malware☆133Aug 25, 2023Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆303Feb 7, 2024Updated 2 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆79Mar 15, 2024Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- fireELF - Fileless Linux Malware Framework☆682Apr 17, 2019Updated 7 years ago
- Bro analyzer that detects Google's QUIC protocol☆11Mar 2, 2021Updated 5 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆272Oct 23, 2022Updated 3 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆166Nov 26, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆37Dec 7, 2025Updated 5 months ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Apr 21, 2021Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Raptor - Web application firewall [ Stable ]☆15Dec 8, 2016Updated 9 years ago
- C# DCOM Execution☆17Aug 4, 2019Updated 6 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- A simple program that calculates a checksum over its own executable program memory☆12Mar 12, 2017Updated 9 years ago