timb-machine / linux-malware
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,173Updated 2 months ago
Alternatives and similar repositories for linux-malware:
Users that are interested in linux-malware are comparing it to the libraries listed below
- Credentials Dumper for Linux using eBPF☆1,135Updated 7 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,984Updated 9 months ago
- Research code & papers from members of vx-underground.☆1,217Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆899Updated 11 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,838Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,544Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆830Updated last month
- This is a repository of resource about Malware techniques☆793Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,174Updated 3 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,440Updated 2 years ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,270Updated last week
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆703Updated this week
- Chepy is a python lib/cli equivalent of the awesome CyberChef tool.☆974Updated last week
- Collection of various malicious functionality to aid in malware development☆1,633Updated last year
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,606Updated last year
- ☆604Updated last month
- A list of cyber-chef recipes and curated links☆2,074Updated 10 months ago
- Windows kernel and user mode emulation.☆1,636Updated 3 weeks ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,884Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,002Updated last month
- Offensive Software Exploitation Course☆2,368Updated last year
- Portable Executable reversing tool with a friendly GUI☆3,019Updated this week
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆2,160Updated 4 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,116Updated last month
- A Simple Ransomware Vaccine☆961Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆805Updated 2 years ago
- ☆541Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,437Updated last year
- Sandman is a NTP based backdoor for red team engagements in hardened networks.☆786Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,302Updated 2 months ago