Malware campaigns and APTs research by BlackArrow
☆19Apr 30, 2020Updated 5 years ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- Discover web technologies in web applications from your terminal☆55Nov 18, 2021Updated 4 years ago
- Public Exploits☆10Apr 6, 2021Updated 5 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- iTerm 2 Fallout color theme.☆12Dec 6, 2016Updated 9 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆27Aug 2, 2025Updated 8 months ago
- ☆11Mar 12, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆15Apr 8, 2024Updated 2 years ago
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆32Jan 28, 2020Updated 6 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆33Feb 4, 2026Updated 2 months ago
- ☆13Sep 26, 2020Updated 5 years ago
- conti locker ransomware source code leak☆30Mar 5, 2022Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆11Jun 4, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 3 years ago
- A small PoC for bpfdoor malware technique☆20Feb 2, 2024Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆48Jul 13, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- AzureAD Pentest☆25Mar 24, 2022Updated 4 years ago
- 一款基于Http.sys的利用工具 ZhuriLab/Joker 备份☆27Nov 16, 2022Updated 3 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 5 months ago
- Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory.☆18Mar 2, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆22Feb 15, 2026Updated last month
- Iterators for the V Programming Language☆13Mar 23, 2021Updated 5 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 4 years ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. 💜…☆12Apr 10, 2025Updated last year
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆16Oct 15, 2016Updated 9 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago