mether049 / malwareLinks
Malware (analysis results, tools, reference, analysis methods, etc.)
β13Updated 2 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- β12Updated 8 years ago
- Shellcode / Buffer Overflow π£β20Updated 4 years ago
- Working exploit code for CVE-2019-17625β18Updated 5 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 7 years ago
- β43Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwritesβ29Updated 4 years ago
- β50Updated 4 years ago
- Executables created while writing "Introduction to Manual Backdooring".β79Updated 8 years ago
- A Catalog of Application Whitelisting Bypass Techniquesβ31Updated 10 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.β18Updated 5 years ago
- A Simple PE File Heuristics Scannersβ49Updated 6 years ago
- Sources Codes of many Office Malwaresβ16Updated 2 years ago
- β11Updated 6 years ago
- Sources code extracted from malwares for analysisβ36Updated 2 years ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offlineβ35Updated 5 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Frameworkβ19Updated 4 years ago
- Automate SSH communication with firewalls, switches, etc.β26Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.β12Updated 6 years ago
- Self defense post module for metasploitβ17Updated 5 years ago
- Exploit for win10 SMB3.1β17Updated 5 years ago
- β30Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.β27Updated 8 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatioβ¦β35Updated 8 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.β14Updated 5 years ago
- β23Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.β12Updated 4 years ago
- Simple C2 over the Trello APIβ38Updated 2 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.β17Updated 4 years ago
- Tool to test for existence of CVE-2020-8218β22Updated 4 years ago
- Nmap script to check vulnerability CVE-2021-21972β28Updated 4 years ago