tthtlc / awesome_malware_techniquesLinks
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆26Updated 2 years ago
Alternatives and similar repositories for awesome_malware_techniques
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
Sorting:
- Nexus of Android banking Trojans☆15Updated last year
- iOS malware samples☆42Updated 9 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Updated last year
- Malicious Software SRC Extract☆31Updated 2 years ago
- Cryptocurrencies related Security resources☆14Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- A Collection of Android Malware☆17Updated 6 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- ☆18Updated last year
- ☆52Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 6 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- ☆33Updated 5 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- ☆17Updated 3 years ago
- buffer overflow examples☆22Updated 7 years ago
- ☆24Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 3 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 3 years ago