petikvx / ELFMalwaresLinks
Some ELF Malwares
☆9Updated 3 years ago
Alternatives and similar repositories for ELFMalwares
Users that are interested in ELFMalwares are comparing it to the libraries listed below
Sorting:
- ☆16Updated 2 years ago
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Free Email Providers☆10Updated last year
- ☆12Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 6 months ago
- ☆14Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 11 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- ☆17Updated 3 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆24Updated 2 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- ☆19Updated last year
- A C# Tool to gather information about email breaches☆14Updated last year
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago