tthtlc / awesome_malware_techniquesLinks
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆26Updated 2 years ago
Alternatives and similar repositories for awesome_malware_techniques
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
Sorting:
- Nexus of Android banking Trojans☆15Updated 2 years ago
- Repository of tools used in my blog☆52Updated last year
- ☆53Updated 4 years ago
- iOS malware samples☆43Updated 9 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 4 months ago
- ☆27Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ☆25Updated 3 years ago
- A Collection of Android Malware☆18Updated 6 years ago
- ☆28Updated 6 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated last week
- Some malware samples or suspicious files I found and their reports.☆38Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Curated list of ransomware-related resources; awesome style.☆21Updated 10 months ago
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 5 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Updated 4 years ago
- Low Interaction Mobile Honeypot☆96Updated 5 months ago
- Sp00fer blog post -☆25Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- RATs library 2003 to present☆16Updated 2 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated last month
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆13Updated 5 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago