lucacav / steg-in-the-wild
A list of attacks or malware using steganography or information hiding
☆51Updated 7 months ago
Related projects: ⓘ
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆39Updated 2 years ago
- Notes and IoCs of fresh malware☆58Updated 2 months ago
- Malware Detection using Machine Learning (MDML)☆46Updated last year
- Android malware sample library.☆63Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆114Updated 3 years ago
- Malware Analysis Tools☆28Updated 4 years ago
- Malware Sandboxes & Malware Source☆78Updated 7 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆79Updated last year
- A free online class on network information hiding/steganography/covert channels.☆92Updated last week
- Just another collection of links, tools, reports and other stuff☆19Updated 3 years ago
- ☆44Updated 2 weeks ago
- Warning! This repository contains samples of ransomware.☆91Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆45Updated 5 months ago
- Hive v5 file decryption algorithm☆34Updated last year
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆30Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Modular malware analysis artifact collection and correlation framework☆49Updated 4 months ago
- ☆63Updated last year
- A machine learning malware analysis framework for Android apps.☆114Updated 5 months ago
- A simple windows ransomware simulator that will rename .TXT files a ransomware extension to simulate ransomware behavior for testing vari…☆82Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers.☆107Updated last year
- Some of my Malware Analysis writeups.☆40Updated last year
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Updated last year
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆37Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆108Updated 9 months ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆42Updated 2 years ago
- ☆27Updated 3 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Updated last month