tthtlc / awesome_malware_techniques
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
β26Updated 2 years ago
Alternatives and similar repositories for awesome_malware_techniques:
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
- Nexus of Android banking Trojansβ15Updated last year
- Fresh malware samples caught in the wild daily from random places. π£β18Updated 5 years ago
- Sp00fer blog post -β26Updated 2 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwordsβ13Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.β29Updated 11 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting toolβ16Updated 3 years ago
- ShellC0de Generatorβ11Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β28Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 4 years ago
- β24Updated 2 years ago
- Hashes of infamous malwareβ26Updated last year
- Some useful scripts for CobaltStrikeβ10Updated 6 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β12Updated 2 years ago
- Automated Penetration Testingβ14Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated 11 months ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 5 years ago
- Repository of tools used in my blogβ51Updated last year
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windowsβ15Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Updated 4 years ago
- β17Updated 3 years ago
- iOS malware samplesβ43Updated 8 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound mannerβ32Updated 2 years ago
- This is the official repository for Basic Malware Analysis Courseβ19Updated 3 years ago
- Central IoC scanner based on Lokiβ20Updated 3 years ago
- β33Updated 2 months ago
- Burp suite Certificate modification toolβ18Updated last year
- Host IDS for desktop usersβ11Updated 4 years ago
- A collection of malware samples caught by DIONAEA Honeypotβ11Updated 5 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck frameworkβ12Updated 2 years ago
- Recon-ng modules for basic OSINT.β11Updated 2 years ago