vxlabinfo / malware
☆27Updated 8 years ago
Alternatives and similar repositories for malware:
Users that are interested in malware are comparing it to the libraries listed below
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- ☆14Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- A framework for creating modular bots/backdoors☆21Updated 9 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- A simple shellcode runner☆20Updated 10 years ago
- Compiler exploits and exploitable non-obvious source code back doors.☆49Updated 2 months ago
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆79Updated 6 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- ☆42Updated 6 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Updated 10 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Zendar is a Linux rootkit based off of the LD_PRELOAD method used by Azazel and Jynx alike☆17Updated 9 years ago
- ☆30Updated 8 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Tool for easy clean PE32 from AV signature☆27Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- A simple reflective dll example☆18Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago