mether049 / malwareLinks
Malware (analysis results, tools, reference, analysis methods, etc.)
☆15Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- ☆12Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- ☆50Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆26Updated 5 months ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Working exploit code for CVE-2019-17625☆18Updated 5 years ago
- All Security Resource Collections Repos That I Published.☆127Updated 5 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- Botnet Simulation Framework☆77Updated 5 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆32Updated 3 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- Introductory software reverse engineering tutorial for beginners☆36Updated 6 years ago
- ☆25Updated 5 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆45Updated 6 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- Good Stuff from Dark Web☆37Updated last year
- with metasploit☆63Updated 5 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago