Live Dangerous Linux Malware Samples!
☆22May 5, 2020Updated 5 years ago
Alternatives and similar repositories for Malware-Samples
Users that are interested in Malware-Samples are comparing it to the libraries listed below
Sorting:
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- my emacs config☆12Dec 22, 2016Updated 9 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- USB device management to prevent against BadUSB attacks☆24Oct 4, 2014Updated 11 years ago
- A tool for patching/injecting code into elf binaries.☆14Sep 27, 2012Updated 13 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Apr 4, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- Small and lightweight Apache module to log POST data of a HTTP request☆70May 1, 2018Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- Binary Analysis Platform -- I will try to keep this updated with patches, fixes, etc.☆33Oct 1, 2014Updated 11 years ago
- basic linux container implementation in C☆12Sep 7, 2020Updated 5 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Telegram BotNet☆35Dec 9, 2023Updated 2 years ago
- Full functional Chinese Input Method for iOS (iPhone/iPad), using Objective C.☆12Aug 14, 2016Updated 9 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- The Payum extension. 歐付寶金流☆12Sep 28, 2017Updated 8 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Fire and forget password cracking and complexity analysis.☆35Jan 4, 2016Updated 10 years ago
- Mass Android app vulnerability analysis toolkit☆13Dec 6, 2016Updated 9 years ago
- Analysis Correlation Engine☆23Feb 8, 2022Updated 4 years ago
- lkm rootkit☆15May 12, 2014Updated 11 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- library to decode/parse zeus-like configuration files☆30Mar 19, 2018Updated 8 years ago
- XLOCK Is a light, and powerful file locker that with features such as an interactive file interface, work in-progress shell with commands…☆13Jan 10, 2019Updated 7 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 7 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆40Jul 28, 2018Updated 7 years ago
- A simple linux rootkit project for COMP9447: Security Workshop☆20Jun 24, 2013Updated 12 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago