hackers-terabit / miraiLinks
backup (educational) of the mirai bot source and instructions.
☆23Updated 9 years ago
Alternatives and similar repositories for mirai
Users that are interested in mirai are comparing it to the libraries listed below
Sorting:
- ☆53Updated 10 years ago
- Linux malware analysis based on Cuckoo Sandbox.☆41Updated 2 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 8 years ago
- A Python, client/server, mutation-based file fuzzer that uses PyDBG to monitor the target application. Check out the README for full deta…☆49Updated 9 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Updated 9 years ago
- Malware.lu tools☆63Updated 12 years ago
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆41Updated 9 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Updated 3 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- LKM rootkit for Linux x86 with the 2.6 kernel. It inserts salts inside system_call and sysenter_entry.☆87Updated 2 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Updated 8 years ago
- malware-traffic-analysis.net PCAPs repository.☆38Updated 9 years ago
- Black Hat 2016 Slides, Paper and Code☆82Updated 9 years ago
- windows kernel vulnerability found by me☆90Updated 8 years ago
- A Libemu Cython wrapper☆128Updated 2 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- Challenges, notes & other stuff from the HackEire CTF.....☆35Updated 9 years ago
- A malware/botnet analysis framework written in Ruby.☆195Updated 2 years ago
- Automated Memory Analysis (Black Hat Arsenal 2014)☆32Updated 11 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆77Updated 8 years ago
- The Cisco IOS Debugger and Integrated Disassembler Environment☆79Updated 7 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- The first open source vulnerability scanner for firmwares☆196Updated 9 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆74Updated 9 years ago
- Certified Edible Dinosaurs official CTF toolkit☆120Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- ☆96Updated 7 years ago
- A tool for checking exploitability☆210Updated 6 years ago