tthtlc / awesome_malware_techniquesLinks
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆26Updated 2 years ago
Alternatives and similar repositories for awesome_malware_techniques
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
Sorting:
- Nexus of Android banking Trojans☆15Updated last year
- ☆24Updated 2 years ago
- A Collection of Android Malware☆17Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- iOS malware samples☆43Updated 9 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- ☆25Updated 5 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- Hashes of infamous malware☆26Updated last year
- Repository of tools used in my blog☆51Updated last year
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 11 months ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Malicious Software SRC Extract☆30Updated 2 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago