vxunderground / MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
☆17,008Updated 8 months ago
Alternatives and similar repositories for MalwareSourceCode
Users that are interested in MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆12,454Updated last week
- The Havoc Framework☆7,703Updated 2 weeks ago
- Reverse Engineer's Toolkit☆5,022Updated 2 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,185Updated 6 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,093Updated this week
- Research code & papers from members of vx-underground.☆1,270Updated 3 years ago
- articles☆13,253Updated 2 years ago
- 🕵️♂️ Offensive Google framework.☆16,704Updated 3 weeks ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,163Updated 2 months ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,419Updated last week
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆6,948Updated last year
- Adversary Emulation Framework☆9,699Updated this week
- Gather and update all available and newest CVEs with their PoC.☆7,098Updated this week
- Network Analysis Tool☆3,259Updated 2 years ago
- Offensive Software Exploitation Course☆2,374Updated 2 years ago
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆8,987Updated 2 weeks ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,183Updated 2 months ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,453Updated 6 months ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,108Updated last week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆17,956Updated 3 weeks ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,036Updated 3 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,180Updated 4 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,838Updated 2 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,291Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆68,696Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆24,135Updated this week
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,867Updated last year
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,163Updated 7 months ago
- A repository full of malware samples.☆1,368Updated last year
- An open-source post-exploitation framework for students, researchers and developers.☆9,231Updated last month