vxunderground / MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
☆17,779Updated 4 months ago
Alternatives and similar repositories for MalwareSourceCode
Users that are interested in MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,611Updated 2 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,502Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,810Updated last week
- 🕵️♂️ Offensive Google framework.☆18,290Updated 3 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,156Updated this week
- Research code & papers from members of vx-underground.☆1,349Updated 4 years ago
- Scanning APK file for URIs, endpoints & secrets.☆5,781Updated 5 months ago
- The Havoc Framework☆8,109Updated last month
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,222Updated 5 years ago
- The recursive internet scanner for hackers. 🧡☆9,351Updated last week
- Browser In The Browser (BITB) Templates☆2,878Updated 2 years ago
- Reverse Engineer's Toolkit☆5,161Updated 8 months ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,136Updated 2 years ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆2,255Updated 3 months ago
- For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.☆3,446Updated last week
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,514Updated this week
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,147Updated 9 months ago
- Infection Monkey - An open-source adversary emulation platform☆6,930Updated 8 months ago
- A repository full of malware samples.☆1,533Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆68,463Updated this week
- A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and…☆1,546Updated last week
- Collection of various malicious functionality to aid in malware development☆1,835Updated last year
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,773Updated last week
- A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Boun…☆10,096Updated this week
- Gather and update all available and newest CVEs with their PoC.☆7,511Updated this week
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆8,296Updated last month
- Hunt down social media accounts by username across social networks☆72,219Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14,521Updated 3 months ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆3,029Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,094Updated 2 weeks ago