alichtman / malware-techniquesLinks
A collection of techniques commonly used in malware to accomplish core tasks.
☆84Updated 6 years ago
Alternatives and similar repositories for malware-techniques
Users that are interested in malware-techniques are comparing it to the libraries listed below
Sorting:
- Linux Rootkits (4.x Kernel)☆82Updated 4 years ago
- Personal research and publication on malware families☆139Updated 6 months ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- ☆51Updated 2 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Updated 11 months ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 2 years ago
- x64 Windows Exploit Development☆111Updated 10 months ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆28Updated 5 years ago
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- Fast and intuitive manager for multiple reverse shells☆85Updated 7 months ago
- Golang ransomware☆46Updated 4 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆92Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆85Updated 2 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 10 months ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆116Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 4 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆96Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- A Kaiten rewrite, with much new functionality, and many fixes for the old stuff!☆41Updated 8 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- king of the hill cybersecurity competition☆30Updated 3 years ago
- Repo for the Gitbook Practical Hacking☆101Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- ☆65Updated 8 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- A proof-of-concept reverse-shell written in rust.☆33Updated 6 years ago