A collection of techniques commonly used in malware to accomplish core tasks.
☆83Jun 15, 2019Updated 6 years ago
Alternatives and similar repositories for malware-techniques
Users that are interested in malware-techniques are comparing it to the libraries listed below
Sorting:
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Apr 27, 2020Updated 5 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- Set of antianalysis techniques found in malware☆133Aug 25, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Mar 23, 2020Updated 5 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- ☆37Mar 3, 2025Updated last year
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆79Mar 15, 2024Updated last year
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- ☆15Oct 29, 2024Updated last year
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Jun 21, 2022Updated 3 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Work in Progress repo☆16Apr 18, 2019Updated 6 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Feb 22, 2026Updated 2 weeks ago
- Fully obfuscated trojan generator for windows.☆10Jul 3, 2019Updated 6 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- Community driven computer worm☆69Aug 15, 2022Updated 3 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago