Malware vulnerability research. Coming soon..
☆12Apr 20, 2020Updated 5 years ago
Alternatives and similar repositories for MalwareVulnerabilitiesExposures
Users that are interested in MalwareVulnerabilitiesExposures are comparing it to the libraries listed below
Sorting:
- ☆14Apr 29, 2020Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- Kill Switch Script - stops traffic leaking from you if your VPN goes down.☆13Sep 20, 2016Updated 9 years ago
- api-tracer is a tiny (useless) tracer☆17Feb 28, 2023Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- ¯\_(ツ)_/¯☆30Dec 16, 2019Updated 6 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 7 years ago
- Kernel mode windows NT API logger☆22Sep 9, 2019Updated 6 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 4 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Meetuplardan arta kalanlar☆42Aug 18, 2025Updated 6 months ago
- A kernel mode Windows rootkit in development.☆49Dec 31, 2021Updated 4 years ago
- Reversing and reimplementing "powercfg /requests" using Native API☆30Jul 25, 2024Updated last year
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- Provides a way which you can load a .NET dll/exe from disk, modify/inject IL, and then run the assembly all in memory without modifying t…☆29Mar 31, 2017Updated 8 years ago
- AMSI Bypass Via the Heap☆107Nov 20, 2020Updated 5 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Dump Windows PE file information in C☆24May 2, 2015Updated 10 years ago
- ☆29May 1, 2020Updated 5 years ago
- ☆40Nov 5, 2019Updated 6 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Jul 7, 2017Updated 8 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- idenLib (Library Function Identification) plugin for x32dbg☆41Feb 26, 2019Updated 7 years ago
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- HTTPS-based Remote Administration Tool (RAT)☆29Sep 9, 2016Updated 9 years ago
- Golang port of PEFile☆32Jul 23, 2020Updated 5 years ago
- Run commands with hidden console.☆31Jan 24, 2021Updated 5 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago