timb-machine / linux-malwareLinks
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,189Updated 3 months ago
Alternatives and similar repositories for linux-malware
Users that are interested in linux-malware are comparing it to the libraries listed below
Sorting:
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆912Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,461Updated 2 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,997Updated last year
- Research code & papers from members of vx-underground.☆1,288Updated 3 years ago
- ☆546Updated 3 years ago
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,210Updated 8 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆822Updated 2 years ago
- Offensive Software Exploitation Course☆2,376Updated 2 years ago
- A DFIR tool written in Python.☆1,052Updated 4 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,054Updated 4 years ago
- ☆1,467Updated last year
- This is a repository of resource about Malware techniques☆809Updated 2 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆785Updated 10 months ago
- Credentials Dumper for Linux using eBPF☆1,148Updated 11 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,893Updated last year
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆933Updated 2 years ago
- Golang malware development library☆973Updated 8 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,575Updated last year
- ☆630Updated 5 months ago
- Everything related to Linux Forensics☆704Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,660Updated last month
- ☆1,064Updated last year
- A framework for constructing self-spreading binaries☆1,018Updated last year
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆750Updated 2 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,397Updated last month
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,631Updated last year
- PoC exploits for software vulnerabilities☆681Updated 4 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,731Updated last year