tthtlc / awesome_malware_techniquesLinks
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆27Updated 3 years ago
Alternatives and similar repositories for awesome_malware_techniques
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
Sorting:
- Nexus of Android banking Trojans☆15Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- ☆53Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last month
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated last month
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- ☆27Updated 4 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- decompiled pegasus_spyware☆14Updated 4 years ago
- iOS malware samples☆44Updated 9 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- buffer overflow examples☆22Updated 8 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Updated 4 years ago
- ☆22Updated 9 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Web App Pen Tester (Web Interface)☆32Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- ☆33Updated 11 months ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- RATs library 2003 to present☆16Updated 2 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- All Type Of Tools written in multipule language .☆22Updated 3 years ago
- Free Email Providers☆11Updated 2 years ago