Malware that we analyzed on our site.
☆25Nov 12, 2025Updated 6 months ago
Alternatives and similar repositories for Malware-Sample
Users that are interested in Malware-Sample are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Awesome list of Search Engines for Cybersecurity Researchers☆306Dec 6, 2025Updated 5 months ago
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆12May 8, 2020Updated 6 years ago
- Exploiting: CVE-2021-41349☆11Jan 6, 2022Updated 4 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- My Gitbook CyberSec Notes☆21Oct 22, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Jul 26, 2025Updated 9 months ago
- This is the latest version of BinHunter paper☆13Apr 13, 2025Updated last year
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- Conference presentation slides☆2,375Nov 15, 2025Updated 6 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆16Apr 10, 2024Updated 2 years ago
- An Arduino board configuration for a Nano clone with an ATmega328PB incl. Bootloader☆11Aug 12, 2020Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- ☆85Jun 3, 2025Updated 11 months ago
- anything I find interesting regarding reverse engineering☆12May 7, 2017Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Oct 5, 2023Updated 2 years ago
- Java RAT called STRRat - Source code & Deobfuscator☆12Aug 12, 2022Updated 3 years ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆55May 12, 2026Updated last week
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆13Jan 26, 2025Updated last year
- ☆14Sep 1, 2024Updated last year
- A ruleset to find potentially malicious code in macOS malware samples☆41Aug 29, 2023Updated 2 years ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase☆68Aug 7, 2025Updated 9 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated last year
- ☆16Apr 21, 2023Updated 3 years ago
- ☆24Nov 2, 2025Updated 6 months ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Apr 15, 2017Updated 9 years ago
- Hands-on Introduction to Linux Commands and Shell Scripting by IBM on Coursera and Practice Programs.☆22Nov 14, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆13Apr 1, 2019Updated 7 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Wipe or locate Android device on receipt of signed SMS☆12Jun 15, 2016Updated 9 years ago
- A comprehensive collection of hacking tools.☆41Oct 3, 2025Updated 7 months ago
- Snapchat Login Page Clone 2026 Latest is a responsive replica of Snapchat's login screen built with HTML, CSS, and JavaScript. Ideal for …☆39Jan 15, 2026Updated 4 months ago
- Parse greppable Nmap output as a tree☆13Nov 13, 2022Updated 3 years ago
- MetaSSH connects to and runs commands on thousands of machines in seconds.☆18Nov 1, 2018Updated 7 years ago
- ☆18Nov 2, 2024Updated last year
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago