Malware campaigns and APTs research by BlackArrow
☆19Apr 30, 2020Updated 6 years ago
Alternatives and similar repositories for malware-research
Users that are interested in malware-research are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- Public Exploits☆10Apr 6, 2021Updated 5 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- iTerm 2 Fallout color theme.☆12Dec 6, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Well, I have created this shit for educational pruposes (I think)☆38Jul 24, 2022Updated 3 years ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆28Aug 2, 2025Updated 8 months ago
- ☆11Mar 12, 2021Updated 5 years ago
- Paradise Ransomware Source☆13Sep 6, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- C++ Code Injector Class☆22Oct 2, 2020Updated 5 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆15Apr 8, 2024Updated 2 years ago
- web based c2 🏴☠️☆15Aug 10, 2024Updated last year
- Uma pequena coleção de malwares produzidos para atacar em território nacional☆15Feb 26, 2018Updated 8 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Advanced PoC & Research for CVE-2026-0828 (Safetica) and CVE-2025-7771 (ThrottleStop). Analysis of BYOVD (Bring Your Own Vulnerable Drive…☆37Feb 4, 2026Updated 2 months ago
- A Build Your Own Botnet Project Build For People Who Wanna Hijack Peoples Computers And Control Them With Over 300 Features!☆14Jun 2, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A small PoC for bpfdoor malware technique☆20Feb 2, 2024Updated 2 years ago
- ☆11Jun 4, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆11Mar 25, 2023Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Jul 13, 2021Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Mar 10, 2026Updated last month
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- 一款基于Http.sys的利用工具 ZhuriLab/Joker 备份☆27Nov 16, 2022Updated 3 years ago
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 6 months ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Fully functional & encrypted chat-application.☆11Mar 28, 2024Updated 2 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆26Apr 12, 2026Updated 2 weeks ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. 💜…☆12Apr 10, 2025Updated last year
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago