tthtlc / awesome_malware_techniques
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆24Updated 2 years ago
Alternatives and similar repositories for awesome_malware_techniques:
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
- iOS malware samples☆42Updated 8 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Hashes of infamous malware☆25Updated last year
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- ☆22Updated 2 years ago
- My favorite resources and tools for malware analysis.☆40Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆48Updated 6 years ago
- A Collection of Android Malware☆18Updated 5 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Autopsy plugin to extract information from the 'Your Phone' Windows 10 App☆13Updated 4 years ago
- Emulator for Windows Malware Analysis☆15Updated 2 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- ☆3Updated 2 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 7 months ago
- Repository of tools used in my blog☆50Updated 10 months ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- ☆37Updated 3 years ago
- Static and Dynamic Analysis of Malware Samples☆11Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago