tthtlc / awesome_malware_techniquesLinks
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆27Updated 3 years ago
Alternatives and similar repositories for awesome_malware_techniques
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
Sorting:
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 2 months ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ☆27Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆53Updated 4 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- ☆28Updated 5 years ago
- iOS malware samples☆43Updated 9 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Updated 10 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte …☆28Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Updated 4 months ago
- Low Interaction Mobile Honeypot☆97Updated 7 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Updated 4 years ago
- RATs library 2003 to present☆16Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- buffer overflow examples☆23Updated 8 years ago
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21Updated 2 years ago
- ☆22Updated 9 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- All Type Of Tools written in multipule language .☆22Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 3 years ago
- ☆33Updated last year
- Free Advance encryptor for Anon Cloud☆16Updated 3 years ago