Running mirai botnet in lab environment
☆10Apr 9, 2017Updated 8 years ago
Alternatives and similar repositories for security-project-mirai
Users that are interested in security-project-mirai are comparing it to the libraries listed below
Sorting:
- (harmless) mirai botnet client☆14Dec 29, 2016Updated 9 years ago
- ☆22Oct 13, 2017Updated 8 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Dec 22, 2021Updated 4 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- A sample IoT bot origin from Mirai☆20Mar 29, 2017Updated 8 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆12Sep 29, 2025Updated 5 months ago
- The malsource dataset☆12Aug 31, 2021Updated 4 years ago
- debug path list environment variables☆13Dec 23, 2025Updated 2 months ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Python extension for the GNU project debugger (GDB)☆13Mar 6, 2020Updated 5 years ago
- Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation☆10Dec 15, 2019Updated 6 years ago
- ☆10Jan 2, 2016Updated 10 years ago
- CVE-2021-33766-poc☆11Sep 15, 2021Updated 4 years ago
- Random tools and utilities for use with the iOS kernel☆10Jan 7, 2013Updated 13 years ago
- Multi-algo CPUMiner☆13Apr 2, 2016Updated 9 years ago
- Re-codesigning tool for iOS ipa file☆11Dec 31, 2012Updated 13 years ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- Debian10-Linux4.19 Hook sys_call_table By IDT☆11May 9, 2020Updated 5 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Sep 12, 2017Updated 8 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated 2 months ago
- shARP_2.0 is an updated version for shARP with more options for better performance.☆12Oct 12, 2017Updated 8 years ago
- Auto exploiter + Dumper, steal information on victim site, and auto create mailer on victim☆10Jan 6, 2019Updated 7 years ago
- Simple code to trigger low hanging fruit in IOHIDFamily.kext in OS X 10.11.5☆14May 27, 2016Updated 9 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Towards Visual Explanations for Convolutional Neural Networks via Input Resampling☆13Aug 16, 2017Updated 8 years ago
- Scripts for x64dbg to find the OEP of exe files packed with UPX☆15Aug 2, 2017Updated 8 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- The Better IPSW Decryption Utility, Auto Fetch IPSW, Auto Extract and Auto Decrypt - Made by PWN24K - @PWN24K☆14Aug 26, 2015Updated 10 years ago
- A proving grounds for young and aspiring BBOT modules☆15Aug 31, 2022Updated 3 years ago