tthtlc / awesome_malware_techniquesLinks
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆26Updated 3 years ago
Alternatives and similar repositories for awesome_malware_techniques
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
Sorting:
- Nexus of Android banking Trojans☆15Updated 2 years ago
- ☆53Updated 4 years ago
- Repository of tools used in my blog☆52Updated last year
- Hashes of infamous malware☆26Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Updated 6 years ago
- ☆26Updated 3 years ago
- Some malware samples or suspicious files I found and their reports.☆37Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 4 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆47Updated 4 years ago
- iOS malware samples☆43Updated 9 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Updated 4 years ago
- My favorite resources and tools for malware analysis.☆41Updated 5 years ago
- Low Interaction Mobile Honeypot☆95Updated 5 months ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆18Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- RATs library 2003 to present☆16Updated 2 years ago
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆14Updated 5 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- ☆19Updated last year
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated last month
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 4 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 8 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 weeks ago
- ☆27Updated 4 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year