A collection of techniques commonly used in malware to accomplish core tasks.
☆83Jun 15, 2019Updated 6 years ago
Alternatives and similar repositories for malware-techniques
Users that are interested in malware-techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- A vim plugin for navigating between wikiedia articles☆14Jul 13, 2020Updated 5 years ago
- Cross Platform Malware Development Framework☆68Nov 3, 2015Updated 10 years ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Set of antianalysis techniques found in malware☆133Aug 25, 2023Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- ☆38Mar 3, 2025Updated last year
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- fireELF - Fileless Linux Malware Framework☆680Apr 17, 2019Updated 6 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆622Dec 28, 2021Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- A Linux Ransomware☆768Jan 24, 2025Updated last year
- A technique of hiding malicious shellcode via Shannon encoding.☆265Oct 23, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Community driven computer worm☆71Aug 15, 2022Updated 3 years ago
- Fully obfuscated trojan generator for windows.☆10Jul 3, 2019Updated 6 years ago
- Here are the dotfiles for my desktop and laptop. Currently under heavy construction. Will create the first 'release' once most of my conf…☆19Feb 14, 2021Updated 5 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆167Nov 26, 2020Updated 5 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 3 months ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Mar 9, 2022Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple polymorphic virus that changes its signature whenever it replicates☆12Aug 27, 2017Updated 8 years ago
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago