alvin-tosh / Malware-ExhibitLinks
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
☆1,072Updated last year
Alternatives and similar repositories for Malware-Exhibit
Users that are interested in Malware-Exhibit are comparing it to the libraries listed below
Sorting:
- Organized list of my malware development resources☆1,575Updated 3 years ago
- Collection of various malicious functionality to aid in malware development☆1,681Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,563Updated last year
- A repository full of malware samples.☆1,338Updated last year
- Research code & papers from members of vx-underground.☆1,252Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,841Updated 2 months ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.☆459Updated 5 months ago
- A workshop about Malware Development☆1,671Updated 2 years ago
- A collection of malware samples caught by several honeypots i manage☆1,707Updated 3 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,075Updated 2 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆868Updated 4 years ago
- Tools and Techniques for Blue Team / Incident Response☆3,166Updated 2 months ago
- 🕵️ OSINT Tools for gathering information and actions forensics 🕵️☆1,990Updated 3 months ago
- This is a repository of resource about Malware techniques☆802Updated 2 years ago
- ☆1,542Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,202Updated last week
- OffSec OSINT Pentest/RedTeam Tools☆976Updated 2 weeks ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,620Updated 2 weeks ago
- Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything that modify attrib…☆887Updated last year
- ☆2,272Updated last year
- Offensive Software Exploitation Course☆2,371Updated 2 years ago
- Labs for Practical Malware Analysis & Triage☆982Updated 2 months ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆588Updated 3 months ago
- All-in-One malware analysis tool.☆1,616Updated 2 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆435Updated 4 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆394Updated last year
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,037Updated 3 years ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,079Updated 2 months ago
- Small collection of Ransomware organized by family.☆234Updated 8 months ago