gsuareztangil / cryptomining-malware
Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆30Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for cryptomining-malware
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- My favorite resources and tools for malware analysis.☆39Updated 4 years ago
- A collection of malware samples.☆34Updated 6 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆85Updated 7 years ago
- ☆26Updated 3 years ago
- Build a Mirai botnet from the source code.☆38Updated 5 years ago
- Personal research and publication on malware families☆137Updated 2 years ago
- ☆58Updated 7 years ago
- A Linux Cyptomining malware☆36Updated last year
- Ransomeware attack in linux☆12Updated 6 years ago
- Carbanak leaked source☆66Updated 6 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 3 years ago
- enemy SSH Telnet IoT botnet☆58Updated 2 years ago
- A malware dataset curation tool which helps identify packed samples.☆29Updated 6 years ago
- Demonstrate about file-less malware approach using JavaScript☆52Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 7 years ago
- Reversed source code to the Babuk ransomware builder.☆15Updated 3 years ago
- This repository contains a curated list of papers, articles and other sources related to remote access trojans.☆27Updated 2 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆43Updated 2 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 6 years ago
- ☆35Updated 2 years ago
- Malware captured with honeypots☆35Updated 7 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆118Updated 3 years ago
- RAT Museum☆105Updated last year
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆285Updated 3 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆141Updated 5 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70Updated 5 years ago
- SoK: Cryptojacking Malware☆38Updated 3 years ago