objective-see / MalwareLinks
macOS Malware Collection
☆628Updated 3 weeks ago
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- Living Off the Orchard: macOS Binaries (LOOBins) is designed to provide detailed information on various built-in "living off the land" ma…☆518Updated last month
- "The missing ProcMon for macOS": Mac Monitor records Endpoint Security events and displays them for analysis.☆1,257Updated 2 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆841Updated 11 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆1,322Updated last month
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆432Updated last month
- ☆453Updated last year
- This is a repository of resource about Malware techniques☆822Updated 2 years ago
- A cross platform parser for Apple UnifiedLogs!☆318Updated last week
- A curated list of awesome malware persistence tools and resources.☆270Updated 4 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,470Updated 2 weeks ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆400Updated last week
- Collection of various malicious functionality to aid in malware development☆1,840Updated last year
- A curated list of awesome Memory Forensics for DFIR☆521Updated 11 months ago
- Live Feed of C2 servers, tools, and botnets☆743Updated last week
- Gets updates from various clearnet domains and ransomware threat actor domains☆415Updated last year
- ☆380Updated this week
- macOS (& ios) Artifact Parsing Tool☆982Updated this week
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆782Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆684Updated last year
- Forensics Wiki, a wiki devoted to information about digital forensics (also known as computer forensics)☆311Updated 3 weeks ago
- A centralized and enhanced memory analysis platform☆517Updated 6 months ago
- C2 infrastructure over Microsoft Teams.☆738Updated last year
- Aftermath is a free macOS IR framework☆568Updated 4 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆943Updated 4 years ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,035Updated 3 weeks ago
- A repository of credential stealer formats☆243Updated 8 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,290Updated 7 months ago
- A GUI and CLI tool for removing bloat from executables☆441Updated 7 months ago
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 5 months ago