Deobfuscation and analysis of PHP malware captured by a WordPress honey pot
☆142Jun 18, 2021Updated 4 years ago
Alternatives and similar repositories for php-malware-analysis
Users that are interested in php-malware-analysis are comparing it to the libraries listed below
Sorting:
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- A Rust command-line tool for decoding Alpha2-based shellcode.☆11Dec 16, 2020Updated 5 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Collection of various files from infected hosts☆77Mar 22, 2022Updated 4 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆17Feb 7, 2026Updated last month
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- Triage automation for suspect URLs☆13Jul 23, 2019Updated 6 years ago
- Remove your comment history on Reddit as deleting an account does not do so.☆22Aug 20, 2019Updated 6 years ago
- Rekall is an endpoint security solution.☆38Feb 12, 2018Updated 8 years ago
- http(s) proxy pool☆18Jan 5, 2023Updated 3 years ago
- Collection of php malware/backdoors/shell☆48Oct 25, 2020Updated 5 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- A set of commands to bypass Defender (and some other AVs)☆20Jul 25, 2019Updated 6 years ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆38Dec 12, 2022Updated 3 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Feb 4, 2023Updated 3 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- ☆35Dec 9, 2023Updated 2 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- ☆20Oct 19, 2018Updated 7 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Host files with DNS☆32Mar 1, 2016Updated 10 years ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆11Dec 8, 2022Updated 3 years ago
- A must-use plugin loader for including mu-plugins in directories☆11Oct 17, 2023Updated 2 years ago
- Wordfence malware and vulnerability scanner command line utility.☆150Feb 20, 2026Updated last month
- ☆25Sep 28, 2016Updated 9 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Jun 11, 2018Updated 7 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- ☆11May 27, 2021Updated 4 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago