ics-iot-bootcamp / cerberus_research
Research tools for analysing Cerberus banking trojan.
☆127Updated 3 years ago
Alternatives and similar repositories for cerberus_research:
Users that are interested in cerberus_research are comparing it to the libraries listed below
- Popular Android malware seen in 2020☆297Updated 4 years ago
- Android malware sample library.☆65Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆84Updated 2 years ago
- Popular Android threats in 2019☆248Updated 5 years ago
- Personal research and publication on malware families☆137Updated 3 months ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆83Updated 7 years ago
- Exploitkit☆184Updated 8 years ago
- HTTP botnet☆61Updated 8 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- ☆52Updated 4 years ago
- RAT Museum☆105Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- A collection of fraud related tools for research.☆148Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- ☆55Updated 7 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- Android malware threats that spread in 2018☆44Updated 6 years ago
- ☆58Updated 7 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 3 years ago
- Some YARA rules i will add from time to time☆64Updated 2 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆95Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 3 years ago
- Popular Android malware for 2021☆41Updated 3 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- Web Based Command Control Framework (C2) #C2 #PostExploitation #CommandControl #RedTeam #C2Framework #PHPC2 #.NETMalware #Malware #PHPMal…☆264Updated last year
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆140Updated last year
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago