alvin-tosh / Malware-Exhibit
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
☆1,045Updated last year
Alternatives and similar repositories for Malware-Exhibit:
Users that are interested in Malware-Exhibit are comparing it to the libraries listed below
- Organized list of my malware development resources☆1,546Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,543Updated last year
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆439Updated 3 months ago
- A repository full of malware samples.☆1,261Updated last year
- Collection of various malicious functionality to aid in malware development☆1,628Updated last year
- 🕵️ OSINT Tools for gathering information and actions forensics 🕵️☆1,916Updated last month
- All-in-One malware analysis tool.☆1,523Updated last week
- Research code & papers from members of vx-underground.☆1,213Updated 3 years ago
- Offensive Software Exploitation Course☆2,362Updated last year
- ☆432Updated 2 years ago
- OffSec OSINT Pentest/RedTeam Tools☆940Updated 2 months ago
- ⚠️ malware development☆530Updated 10 months ago
- A workshop about Malware Development☆1,655Updated last year
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆391Updated 2 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆713Updated 2 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆387Updated 11 months ago
- The essential toolkit for reversing, malware analysis, and cracking☆841Updated 4 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆978Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆954Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,763Updated 2 weeks ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,049Updated last year
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆513Updated 3 months ago
- This repository contains complete resources and coding practices for malware development using Rust 🦀.☆2,104Updated this week
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆840Updated 4 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆155Updated 6 months ago
- Tools and Techniques for Blue Team / Incident Response☆3,056Updated 3 weeks ago
- Open Source Intelligence Interface for Deep Web Scraping☆1,039Updated 7 months ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆850Updated last year
- This is a repository of resource about Malware techniques☆791Updated 2 years ago
- Awesome Pentest Tools Collection☆1,278Updated 8 months ago