timb-machine / linux-malware
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,141Updated last month
Alternatives and similar repositories for linux-malware:
Users that are interested in linux-malware are comparing it to the libraries listed below
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆884Updated 7 months ago
- Windows kernel and user mode emulation.☆1,553Updated 9 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,498Updated last year
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,833Updated 3 weeks ago
- Materials for Windows Malware Analysis training (volume 1)☆1,957Updated 6 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,070Updated last month
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆602Updated 2 years ago
- Credentials Dumper for Linux using eBPF☆1,128Updated 4 months ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,507Updated last week
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆662Updated 3 weeks ago
- Leaked pentesting manuals given to Conti ransomware crooks☆961Updated 3 years ago
- Research code & papers from members of vx-underground.☆1,174Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,732Updated 2 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆800Updated last year
- Microsoft » Windows 10 : Security Vulnerabilities☆900Updated last year
- ☆506Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,373Updated 2 years ago
- Defences against Cobalt Strike☆1,282Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆2,996Updated 2 weeks ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,067Updated 3 years ago
- A DFIR tool written in Python.☆1,044Updated 3 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆823Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,386Updated 4 months ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,884Updated 5 months ago
- A list of cyber-chef recipes and curated links☆2,049Updated 7 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,788Updated 10 months ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,804Updated 9 months ago
- Golang malware development library☆944Updated last month
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆918Updated last year