gsuareztangil / cryptomining-malware
Resources for our (extended) version of our IMC Crypto-Mining Malware paper
☆30Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for cryptomining-malware
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- Python script to automatically deobfuscate malware code☆58Updated 6 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆119Updated 3 years ago
- A Linux Cyptomining malware☆36Updated last year
- RAT Museum☆105Updated last year
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆86Updated 7 years ago
- Malware captured with honeypots☆35Updated 7 years ago
- Collection of windows rootkits☆25Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆41Updated 2 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆21Updated 7 years ago
- Easiest way to download samples through VirusTotal Intelligence☆38Updated 7 years ago
- A collection of malware samples.☆34Updated 6 years ago
- MoP - "Master of Puppets" - Advanced malware tracking framework☆82Updated 2 months ago
- A Simple PE File Heuristics Scanners☆50Updated 5 years ago
- ☆58Updated 7 years ago
- Personal research and publication on malware families☆137Updated 2 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆30Updated 6 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆12Updated 8 years ago
- Android malware sample library.☆64Updated 2 years ago
- ☆26Updated 3 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- This repository contains a curated list of papers, articles and other sources related to remote access trojans.☆28Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆43Updated 2 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 7 years ago
- Sources code extracted from malwares for analysis☆36Updated last year
- Dataset of packed ELF samples☆17Updated last year
- My favorite resources and tools for malware analysis.☆40Updated 4 years ago