mether049 / malwareLinks
Malware (analysis results, tools, reference, analysis methods, etc.)
☆15Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- ☆12Updated 8 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- ☆49Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- ☆43Updated 6 years ago
- Introductory software reverse engineering tutorial for beginners☆36Updated 6 years ago
- APT34/OILRIG leak☆11Updated 6 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆27Updated 8 months ago
- Hunt and Analyze Tor Onion Sites☆23Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Just some random stuff for AppLocker☆18Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆55Updated 7 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Updated 6 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27Updated 5 years ago
- ☆23Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 4 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Updated 6 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 6 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆19Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 3 years ago