tthtlc / awesome_malware_techniques
This will compile a list of Android, iOS, Linux malware techniques for attacking and detection purposes.
☆26Updated 2 years ago
Alternatives and similar repositories for awesome_malware_techniques:
Users that are interested in awesome_malware_techniques are comparing it to the libraries listed below
- Nexus of Android banking Trojans☆15Updated last year
- Hashes of infamous malware☆26Updated last year
- iOS malware samples☆43Updated 8 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- A Collection of Android Malware☆17Updated 6 years ago
- Static and Dynamic Analysis of Malware Samples☆12Updated 5 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆19Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆18Updated 5 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 3 years ago
- ☆24Updated 2 years ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 11 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- ☆18Updated last year
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- ☆12Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 9 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- New Framework Red Team Operations☆18Updated 3 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago