timb-machine / linux-malware
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,172Updated last month
Alternatives and similar repositories for linux-malware:
Users that are interested in linux-malware are comparing it to the libraries listed below
- Materials for Windows Malware Analysis training (volume 1)☆1,975Updated 9 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆891Updated 10 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,536Updated last year
- Research code & papers from members of vx-underground.☆1,199Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,389Updated 2 years ago
- This is a repository of resource about Malware techniques☆790Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆805Updated 2 years ago
- Windows kernel and user mode emulation.☆1,627Updated this week
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,543Updated last month
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,116Updated this week
- Defences against Cobalt Strike☆1,282Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,153Updated 2 months ago
- Malware Configuration And Payload Extraction☆2,294Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,797Updated last year
- Elastic Security detection content for Endpoint☆1,156Updated this week
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,234Updated last year
- Sophos-ReversingLabs 20 million sample dataset☆653Updated 3 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆610Updated 3 years ago
- ☆540Updated 3 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,775Updated 10 months ago
- Free hands-on digital forensics labs for students and faculty☆1,766Updated this week
- ☆1,040Updated 10 months ago
- Bringing you the best of the worst files on the Internet.☆322Updated 3 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,295Updated 3 months ago
- awesome-linux-rootkits☆1,807Updated 2 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,260Updated last year
- ☆1,464Updated last year
- Distributed malware processing framework based on Python, Redis and S3.☆406Updated last week
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆696Updated 3 weeks ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆572Updated last week