A collection of techniques commonly used in malware to accomplish core tasks.
☆83Jun 15, 2019Updated 6 years ago
Alternatives and similar repositories for malware-techniques
Users that are interested in malware-techniques are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Personal research and publication on malware families☆142Dec 28, 2024Updated last year
- Cross Platform Malware Development Framework☆68Nov 3, 2015Updated 10 years ago
- Extensible Red Team Framework☆112Dec 2, 2019Updated 6 years ago
- EGESPLOIT is a golang library for malware development☆339Jan 26, 2017Updated 9 years ago
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Set of antianalysis techniques found in malware☆132Aug 25, 2023Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- ☆34Mar 31, 2026Updated 2 weeks ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Red Team engagement platform with the goal of unifying offensive tools behind a simple UI☆301Feb 7, 2024Updated 2 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆80Mar 15, 2024Updated 2 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- fireELF - Fileless Linux Malware Framework☆680Apr 17, 2019Updated 7 years ago
- A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.☆621Dec 28, 2021Updated 4 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- A Linux Ransomware☆772Jan 24, 2025Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆31Jun 23, 2022Updated 3 years ago
- A technique of hiding malicious shellcode via Shannon encoding.☆269Oct 23, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Aaron's Dotfiles (macOS and Linux compatible)☆37Mar 21, 2026Updated 3 weeks ago
- Community driven computer worm☆71Aug 15, 2022Updated 3 years ago
- Fully obfuscated trojan generator for windows.☆10Jul 3, 2019Updated 6 years ago
- A library for loading and executing PE (Portable Executable) from memory without ever touching the disk☆166Nov 26, 2020Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Mar 9, 2022Updated 4 years ago
- ☆69Jul 26, 2021Updated 4 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆144Jun 21, 2023Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆25Apr 21, 2021Updated 4 years ago