timb-machine / linux-malwareLinks
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,191Updated 4 months ago
Alternatives and similar repositories for linux-malware
Users that are interested in linux-malware are comparing it to the libraries listed below
Sorting:
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,465Updated 2 years ago
- A DFIR tool written in Python.☆1,052Updated 4 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,005Updated last year
- ☆547Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆912Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,579Updated last year
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆757Updated 2 months ago
- Golang malware development library☆972Updated 9 months ago
- ☆1,466Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆1,058Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆934Updated 2 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago
- Credentials Dumper for Linux using eBPF☆1,147Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,900Updated last year
- Offensive Software Exploitation Course☆2,381Updated 2 years ago
- Research code & papers from members of vx-underground.☆1,295Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆824Updated 2 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,200Updated this week
- Defences against Cobalt Strike☆1,292Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,786Updated 2 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,637Updated last year
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 5 months ago
- This is a repository of resource about Malware techniques☆810Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,408Updated last month
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,279Updated last month
- My curated list of awesome links, resources and tools on infosec related topics☆1,124Updated last month
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,504Updated last year
- A list of cyber-chef recipes and curated links☆2,131Updated last year
- Collaborative Malware Analysis Platform at Scale☆762Updated 5 months ago