mether049 / malwareLinks
Malware (analysis results, tools, reference, analysis methods, etc.)
☆13Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- ☆12Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- A Simple PE File Heuristics Scanners☆50Updated 6 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- Just some random stuff for AppLocker☆18Updated 6 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- ☆50Updated 5 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆14Updated 8 years ago
- Tool to predict attacker groups from the techniques and software used☆49Updated 3 years ago
- Self defense post module for metasploit☆17Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Interactive Post Exploitation Tool☆37Updated 5 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- ☆43Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆53Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 5 years ago
- ☆25Updated last year
- Side Channel script☆25Updated 2 years ago
- iOS malware samples☆41Updated 9 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Botnet Simulation Framework☆77Updated 4 years ago
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.☆32Updated 9 years ago