timb-machine / linux-malwareLinks
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,201Updated 7 months ago
Alternatives and similar repositories for linux-malware
Users that are interested in linux-malware are comparing it to the libraries listed below
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,016Updated last year
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆920Updated last year
- ☆1,458Updated last year
- Research code & papers from members of vx-underground.☆1,334Updated 4 years ago
- A DFIR tool written in Python.☆1,053Updated 4 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆615Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,596Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆1,074Updated 4 years ago
- Credentials Dumper for Linux using eBPF☆1,155Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆824Updated 2 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆787Updated 2 weeks ago
- This is a repository of resource about Malware techniques☆819Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆796Updated 3 years ago
- Offensive Software Exploitation Course☆2,390Updated 2 years ago
- A Simple Ransomware Vaccine☆975Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,482Updated last month
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,922Updated last year
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆938Updated 2 years ago
- Defences against Cobalt Strike☆1,292Updated 3 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,253Updated this week
- Everything related to Linux Forensics☆711Updated 2 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆900Updated 5 years ago
- ☆1,071Updated last year
- Connect like there is no firewall. Securely.☆1,788Updated last month
- ☆657Updated 9 months ago
- How to exploit a double free vulnerability in 2021. Use After Free for Dummies☆1,375Updated 11 months ago
- Windows kernel and user mode emulation.☆1,807Updated last month
- Malware analysis platform☆444Updated last year
- EXOCET - AV-evading, undetectable, payload delivery tool☆845Updated 3 years ago