vxunderground / MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
β16,456Updated 2 months ago
Alternatives and similar repositories for MalwareSourceCode:
Users that are interested in MalwareSourceCode are comparing it to the libraries listed below
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.β11,729Updated this week
- The all-in-one browser extension for offensive security professionals πβ5,939Updated last month
- Research code & papers from members of vx-underground.β1,182Updated 3 years ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.β13,692Updated last month
- An open-source post-exploitation framework for students, researchers and developers.β9,062Updated last month
- Reverse Engineer's Toolkitβ4,884Updated 10 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityβ¦β3,908Updated 3 weeks ago
- The recursive internet scanner for hackers. π§‘β7,789Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β5,889Updated 4 months ago
- Tools and Techniques for Red Team / Penetration Testingβ6,279Updated last year
- Adversary Emulation Frameworkβ8,876Updated this week
- Attack Surface Management Platformβ8,403Updated last month
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and nβ¦β9,472Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.β5,086Updated this week
- This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug β¦β19,865Updated this week
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounβ¦β8,277Updated last week
- π΅οΈββοΈ Offensive Google framework.β16,162Updated last week
- articlesβ13,034Updated last year
- Offensive Software Exploitation Courseβ2,356Updated last year
- A swiss army knife for pentesting networksβ8,570Updated last year
- One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password π‘οΈβ5,885Updated 3 weeks ago
- E-mails, subdomains and names Harvester - OSINTβ11,989Updated this week
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis openβ¦β11,569Updated 8 months ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributionsβ2,040Updated last month
- The Havoc Frameworkβ7,220Updated 3 weeks ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ6,803Updated 11 months ago
- An HTTP toolkit for security research.β6,190Updated last week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)β16,783Updated last week
- π‘οΈ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.β4,530Updated 6 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.β9,285Updated 5 months ago