Malware campaigns and APTs research by BlackArrow
☆19Apr 30, 2020Updated 6 years ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 5 years ago
- Public Exploits☆10Apr 6, 2021Updated 5 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated 2 years ago
- Well, I have created this shit for educational pruposes (I think)☆39Jul 24, 2022Updated 3 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Aqui você encontra os materiais de um curso COMPLETO de Graduação em Ciência da Computação de uma das melhores universidades do Brasil.☆10Aug 7, 2020Updated 5 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆15Apr 8, 2024Updated 2 years ago
- web based c2 🏴☠️☆16Aug 10, 2024Updated last year
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago
- my own 2fa bypass methodolgy☆27Sep 22, 2023Updated 2 years ago
- conti locker ransomware source code leak☆31Mar 5, 2022Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Best Private RAT in 2022! HVNC (no shitty Tinynuke) | STEALER | | CLIPPER | | HRDP | | KEYLOGGER |☆11Sep 10, 2022Updated 3 years ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- A small PoC for bpfdoor malware technique☆20Feb 2, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆12Mar 25, 2023Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Jul 13, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated 2 months ago
- AzureAD Pentest☆25Mar 24, 2022Updated 4 years ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 7 months ago
- 一款基于Http.sys的利用工具 ZhuriLab/Joker 备份☆27Nov 16, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 5 years ago
- My software engineering notes.☆24Nov 12, 2025Updated 6 months ago
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Jun 22, 2023Updated 2 years ago
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆27Apr 12, 2026Updated last month