ics-iot-bootcamp / cerberus_researchLinks
Research tools for analysing Cerberus banking trojan.
☆130Updated 3 years ago
Alternatives and similar repositories for cerberus_research
Users that are interested in cerberus_research are comparing it to the libraries listed below
Sorting:
- Android malware sample library.☆70Updated 3 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- RAT Museum☆105Updated 2 years ago
- Angecryption implementation in Python☆16Updated 6 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Popular Android malware seen in 2020☆316Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- ☆59Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆146Updated 6 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆97Updated 2 years ago
- HTTP botnet☆62Updated 9 years ago
- Exploit Pack - Project☆72Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- ☆53Updated 4 years ago
- Personal research and publication on malware families☆142Updated 10 months ago
- mosquito - Automating reconnaissance and brute force attacks☆132Updated 5 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- A curated list of malware repositories, trackers and malware analysis tools☆90Updated 2 years ago
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 5 years ago
- An open source RansomWare☆89Updated 5 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Updated 6 years ago
- Slides from my talk at ISC 2018 in Beijing 2018☆94Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Exploitkit☆185Updated 8 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.☆114Updated 4 years ago
- x64 Windows Exploit Development☆114Updated last year