mether049 / malwareLinks
Malware (analysis results, tools, reference, analysis methods, etc.)
☆15Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 11 years ago
- ☆12Updated 8 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Updated 6 years ago
- ☆50Updated 5 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆27Updated 6 months ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- with metasploit☆63Updated 5 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago
- APT34/OILRIG leak☆11Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Just some random stuff for AppLocker☆17Updated 6 years ago
- Introductory software reverse engineering tutorial for beginners☆36Updated 6 years ago
- A Simple PE File Heuristics Scanners☆52Updated 6 years ago
- Python3 Metasploit automation library☆22Updated 3 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 6 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- Tool to brute website sub-domains and dirs.☆49Updated 5 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆42Updated 3 years ago
- ☆25Updated 5 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Updated 6 years ago
- ☆43Updated 6 years ago