jgamblin / Mirai-Source-CodeLinks
Leaked Mirai Source Code for Research/IoC Development Purposes
☆8,854Updated last year
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- An advanced memory forensics framework☆7,729Updated last month
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,791Updated 2 years ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆11,934Updated this week
- UNIX-like reverse engineering framework and command-line toolset☆21,853Updated this week
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,208Updated 2 years ago
- Dirty COW☆3,392Updated 5 years ago
- CTF framework and exploit development library☆12,666Updated 3 weeks ago
- Course materials for Malware Analysis by RPISEC☆3,876Updated 2 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,081Updated 4 months ago
- Metasploit Framework☆35,753Updated this week
- PEDA - Python Exploit Development Assistance for GDB☆6,010Updated 10 months ago
- Course materials for Modern Binary Exploitation by RPISEC☆5,715Updated 3 years ago
- Ettercap Project☆2,533Updated 2 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,737Updated last year
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆11,642Updated this week
- Defund the Police.☆12,674Updated last year
- Platform to host Capture the Flag competitions☆6,551Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,722Updated 3 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,484Updated 4 years ago
- Some setup scripts for security research tools.☆8,930Updated 3 months ago
- A collection of malware samples caught by several honeypots i manage☆1,707Updated 3 years ago
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,099Updated 10 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,411Updated 4 years ago
- Credentials recovery project☆10,174Updated last month
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,390Updated last month
- A little tool to play with Windows security☆20,286Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,693Updated 5 years ago
- E-mails, subdomains and names Harvester - OSINT☆12,829Updated this week
- Framework for Man-In-The-Middle attacks☆3,620Updated 6 years ago
- A repository for learning various heap exploitation techniques.☆7,739Updated 3 weeks ago