hrtywhy / Malware-LibraryLinks
⚠️ Collection of malicious file ⚠️
☆13Updated 4 years ago
Alternatives and similar repositories for Malware-Library
Users that are interested in Malware-Library are comparing it to the libraries listed below
Sorting:
- ☆28Updated 5 years ago
- Just another collection of links, tools, reports and other stuff☆24Updated 4 years ago
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆23Updated 5 years ago
- Notes and IoCs of fresh malware☆61Updated last year
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆45Updated 2 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆41Updated 2 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated 2 years ago
- ☆66Updated 3 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆32Updated last week
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆68Updated 2 years ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆60Updated 4 months ago
- Repository of open source malware here on Github!☆44Updated 4 years ago
- The book and code repo for the FREE Fundamental C++ book by Kevin Thomas.☆19Updated 2 months ago
- Python, C++ and Go☆22Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated this week
- Papers, presentations and documents from the team at Hacker House.☆52Updated this week
- ☆37Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Unpacking and decryption tools for the Emotet malware☆45Updated 4 years ago
- Get started with writing your first ever Windows Driver☆35Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated 2 years ago
- ☆35Updated 4 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆20Updated 3 years ago
- ☆27Updated 3 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24Updated 2 years ago
- Simple and efficient file shredding☆14Updated 6 years ago