wja0 / IoT-Botnet-Attack-Detection-Module
Development of Botnet Detection Module for Traffic-Based IoT Devices Using Deep Learning
☆13Updated last year
Related projects: ⓘ
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆25Updated 2 years ago
- Sources Codes of many Office Malwares☆15Updated 2 years ago
- Component Services Volatile Environment LPE☆11Updated 2 years ago
- ☆7Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆19Updated 3 years ago
- Shell hunter for AF☆34Updated 2 years ago
- Windows Malware Probe of Concept☆20Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- ☆10Updated this week
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 4 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆18Updated 6 months ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 3 years ago
- Display Languages Volatile Environment LPE☆10Updated 2 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year
- Malware Libraries focused in help Malware Development☆10Updated last year
- Malware persistence via COM DLL hijacking. C++ implementation example☆12Updated 2 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆8Updated 3 years ago
- Another vulnerability scanner☆17Updated 10 months ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆33Updated 3 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- IoT Malware Similarity Analysis Platform☆44Updated 2 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆13Updated 3 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆14Updated last year
- ☆21Updated this week