Collection of Malware Lures
☆23Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for malware_lure
Users that are interested in malware_lure are comparing it to the libraries listed below
Sorting:
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 5 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- 恶意软件家族样本识别/分类器☆13Aug 26, 2021Updated 4 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Sources Codes of many MSIL malwares☆24Aug 29, 2022Updated 3 years ago
- ☆96May 5, 2025Updated 9 months ago
- ☆20Aug 19, 2017Updated 8 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 7 months ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- 编译时混淆字符串,以确保生成的二进制PE不会暴漏明文字符串。(C++ 14 及以上)☆29Sep 30, 2021Updated 4 years ago
- Source code for the Cascade virus☆26May 12, 2016Updated 9 years ago
- 恶意软件原理图☆59Mar 29, 2021Updated 4 years ago
- Simple C++ ransomware, prove the concept.☆27Mar 8, 2017Updated 8 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- ☆28Feb 7, 2021Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆31Dec 17, 2018Updated 7 years ago
- ☆27Jul 11, 2022Updated 3 years ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Sep 9, 2022Updated 3 years ago
- A Simple C&C Server Written In Python☆35Nov 6, 2018Updated 7 years ago
- https://docs.qwqdanchun.com/☆27May 24, 2021Updated 4 years ago
- Integrate your Wazuh-Manager or Graylog with the SOCFortress Threat Intel Service☆32Sep 26, 2024Updated last year
- ☆10Aug 9, 2024Updated last year
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- ☆84Aug 18, 2022Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago