vxunderground / MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
β16,918Updated 7 months ago
Alternatives and similar repositories for MalwareSourceCode
Users that are interested in MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- π΅οΈββοΈ Offensive Google framework.β16,625Updated last month
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etβ¦β10,145Updated last year
- The all-in-one browser extension for offensive security professionals πβ6,140Updated 5 months ago
- Research code & papers from members of vx-underground.β1,252Updated 3 years ago
- The Havoc Frameworkβ7,631Updated 5 months ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ3,059Updated last month
- Reverse Engineer's Toolkitβ4,999Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mandβ¦β7,261Updated 9 months ago
- Collection of various malicious functionality to aid in malware developmentβ1,681Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β17,755Updated 3 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.β5,396Updated last week
- Organized list of my malware development resourcesβ1,576Updated 3 years ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β12,332Updated this week
- Impacket is a collection of Python classes for working with network protocols.β14,461Updated last week
- Tracking interesting Linux (and UNIX) malware. Send PRsβ1,182Updated last month
- Materials for Windows Malware Analysis training (volume 1)β1,991Updated 11 months ago
- β‘ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes β‘β19,578Updated 3 months ago
- Scanning APK file for URIs, endpoints & secrets.β5,330Updated 3 months ago
- An open-source post-exploitation framework for students, researchers and developers.β9,211Updated 2 weeks ago
- Official Black Hat Arsenal Security Tools Repositoryβ4,082Updated 10 months ago
- Offensive Software Exploitation Courseβ2,371Updated 2 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β4,141Updated last month
- My experiments in weaponizing Nim (https://nim-lang.org/)β2,958Updated last year
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering envβ¦β7,400Updated this week
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis openβ¦β11,934Updated last week
- A swiss army knife for pentesting networksβ8,781Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.β5,547Updated last month
- Credentials recovery projectβ10,174Updated last month
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and Cβ8,740Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.β3,262Updated 5 months ago