alichtman / malware-techniquesLinks
A collection of techniques commonly used in malware to accomplish core tasks.
☆83Updated 6 years ago
Alternatives and similar repositories for malware-techniques
Users that are interested in malware-techniques are comparing it to the libraries listed below
Sorting:
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Personal research and publication on malware families☆141Updated 9 months ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 6 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated last year
- repository of tools & resources of the MMD team☆134Updated 3 years ago
- x64 Windows Exploit Development☆114Updated last year
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- Malware captured with honeypots☆38Updated 8 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆88Updated 2 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 5 years ago
- Papers, presentations and documents from the team at Hacker House.☆52Updated 6 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- ☆51Updated 2 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 10 months ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆91Updated last year
- king of the hill cybersecurity competition☆32Updated 3 years ago
- Reverse engineering challenges☆52Updated 5 years ago
- Assignments for the SecurityTube Linux Assembly Expert Certification (SLAE)☆22Updated 6 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- The following repository contains a modified version of SUNBURST with cracekd hashes, comments and annotations.☆56Updated 4 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated last month
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- ☆27Updated 2 years ago
- ☆27Updated 6 years ago