timb-machine / linux-malwareLinks
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,182Updated last month
Alternatives and similar repositories for linux-malware
Users that are interested in linux-malware are comparing it to the libraries listed below
Sorting:
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆904Updated last year
- Materials for Windows Malware Analysis training (volume 1)☆1,991Updated 11 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,564Updated last year
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,869Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,445Updated 2 years ago
- Credentials Dumper for Linux using eBPF☆1,143Updated 9 months ago
- A DFIR tool written in Python.☆1,048Updated 4 years ago
- ☆543Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,778Updated 2 years ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,623Updated last year
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,624Updated 3 weeks ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆728Updated this week
- Research code & papers from members of vx-underground.☆1,252Updated 3 years ago
- Offensive Software Exploitation Course☆2,371Updated 2 years ago
- Adversary tradecraft detection, protection, and hunting☆2,348Updated this week
- A not so awesome list of malware gems for aspiring malware analysts☆810Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,462Updated 2 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,181Updated last month
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,265Updated 5 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,467Updated last year
- Defences against Cobalt Strike☆1,288Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,190Updated 2 months ago
- Sysmon for Linux☆1,902Updated last month
- ☆1,050Updated last year
- Elastic Security detection content for Endpoint☆1,226Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,823Updated last year
- Shellcode injection technique. Given as C++ header, standalone Rust program or library.☆702Updated last year
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,005Updated 10 months ago
- Template-Driven AV/EDR Evasion Framework☆1,691Updated last year