mutur4 / Linux-MalwareLinks
A project for building Linux && IoT Malware for fun and no-profit
☆16Updated 5 months ago
Alternatives and similar repositories for Linux-Malware
Users that are interested in Linux-Malware are comparing it to the libraries listed below
Sorting:
- ☆85Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Situational Awareness script to identify how and where to run implants☆52Updated 6 months ago
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- ☆57Updated 7 months ago
- Command and Control (C2) framework☆127Updated last month
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆27Updated 2 years ago
- ☆72Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆48Updated 5 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆58Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- ☆84Updated 4 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 11 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆83Updated 3 weeks ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆8Updated 2 months ago
- Do some DLL SideLoading magic☆84Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆69Updated last month
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆46Updated last year
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Red Team Operation's Defense Evasion Technique.☆53Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year