ics-iot-bootcamp / cerberus_research
Research tools for analysing Cerberus banking trojan.
☆124Updated 2 years ago
Related projects: ⓘ
- Android malware sample library.☆63Updated 2 years ago
- Popular Android malware seen in 2020☆275Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆79Updated 7 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94Updated 3 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆89Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆79Updated last year
- RAT Museum☆105Updated last year
- Popular Android malware for 2021☆40Updated 2 years ago
- Personal research and publication on malware families☆136Updated 2 years ago
- Linux Rootkits (4.x Kernel)☆83Updated 3 years ago
- ☆181Updated this week
- A collection of interesting and diverse Android malware samples☆29Updated last year
- This repo will contain code snippets for blogs: Malware on Steroids written by me at https://scriptdotsh.com/index.php/category/malware-d…☆188Updated 4 years ago
- ☆58Updated 7 years ago
- Statically unpacking common android banker malware.☆129Updated last month
- Slides from my talk at ISC 2018 in Beijing 2018☆91Updated 5 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- Exploitkit☆178Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 5 years ago
- Popular Android threats in 2019☆245Updated 4 years ago
- ☆43Updated this week
- HTTP botnet☆61Updated 8 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆39Updated 2 years ago
- Windows active user credential phishing tool☆277Updated 4 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆176Updated last year
- ☆167Updated this week
- The source code of the Zeus Evolution botnet that used TOR.☆54Updated 7 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆68Updated 3 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆107Updated 3 years ago
- Warning! This repository contains samples of ransomware.☆91Updated last year