vxlabinfo / malware
☆27Updated 8 years ago
Alternatives and similar repositories for malware:
Users that are interested in malware are comparing it to the libraries listed below
- ☆14Updated 9 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- A simple shellcode runner☆20Updated 10 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 10 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 7 years ago
- ☆30Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- Burp plugin which supports in finding privilege escalation vulnerabilities☆40Updated 2 years ago
- Tool for easy clean PE32 from AV signature☆27Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- ☆42Updated 6 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- ☆24Updated 6 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A collection of shellcodes☆67Updated 12 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated last year
- Data exfiltration PoC scripts☆23Updated 9 years ago