timb-machine / linux-malware
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,127Updated last month
Related projects ⓘ
Alternatives and complementary repositories for linux-malware
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆874Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,356Updated 2 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,786Updated 7 months ago
- Credentials Dumper for Linux using eBPF☆1,116Updated 2 months ago
- Research code & papers from members of vx-underground.☆1,146Updated 2 years ago
- ☆499Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,478Updated 10 months ago
- wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kerne…☆1,475Updated 2 weeks ago
- A DFIR tool written in Python.☆1,043Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,937Updated 4 months ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆779Updated 2 years ago
- Windows kernel and user mode emulation.☆1,516Updated 7 months ago
- Linux eBPF backdoor over TCP. Spawn reverse shells, RCE, on prior privileged access. Less Honkin, More Tonkin.☆1,569Updated last year
- Linux Kernel Defence Map shows the relationships between vulnerability classes, exploitation techniques, bug detection mechanisms, and de…☆1,777Updated 4 months ago
- Connect like there is no firewall. Securely.☆1,535Updated last week
- Defences against Cobalt Strike☆1,281Updated 2 years ago
- Everything related to Linux Forensics☆677Updated last year
- Golang malware development library☆934Updated 7 months ago
- My curated list of awesome links, resources and tools on infosec related topics☆1,060Updated 7 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,044Updated 3 years ago
- Execute ELF files without dropping them on disk☆482Updated 4 months ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆914Updated last year
- Adversary tradecraft detection, protection, and hunting☆2,210Updated this week
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆928Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,237Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,969Updated last week
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆795Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,740Updated last year
- This is a repository of resource about Malware techniques☆638Updated last year