timb-machine / linux-malwareLinks
Tracking interesting Linux (and UNIX) malware. Send PRs
☆1,209Updated 8 months ago
Alternatives and similar repositories for linux-malware
Users that are interested in linux-malware are comparing it to the libraries listed below
Sorting:
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆922Updated last year
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,607Updated 2 years ago
- Research code & papers from members of vx-underground.☆1,351Updated 4 years ago
- A DFIR tool written in Python.☆1,053Updated 4 years ago
- A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.☆1,936Updated last year
- Credentials Dumper for Linux using eBPF☆1,157Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆828Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Updated 3 years ago
- This is a repository of resource about Malware techniques☆822Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,078Updated 4 years ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆797Updated last month
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆795Updated 3 years ago
- Offensive Software Exploitation Course☆2,396Updated 2 years ago
- Adversary tradecraft detection, protection, and hunting☆2,423Updated last week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,523Updated 2 weeks ago
- ☆1,456Updated 2 years ago
- Everything related to Linux Forensics☆719Updated 2 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,307Updated 3 months ago
- EMBA - The firmware security analyzer☆3,338Updated last week
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆937Updated 2 years ago
- Windows kernel and user mode emulation.☆1,831Updated last week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,629Updated last month
- High Octane Triage Analysis☆806Updated this week
- OFRAK: unpack, modify, and repack binaries.☆2,020Updated last week
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,398Updated 11 months ago
- A framework for constructing self-spreading binaries☆1,022Updated 2 years ago
- Malware analysis platform☆445Updated 2 years ago
- Chepy is a python lib/cli equivalent of the awesome CyberChef tool.☆1,027Updated last month