x-Defender / Malware_To_PlayWith
a collection of Advanced Malwares and APT tools for geek analysts to play with
☆43Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Malware_To_PlayWith
- My Malware Analysis Reports☆18Updated 2 years ago
- Malware Analysis Tools☆29Updated 5 years ago
- ☆16Updated last week
- SLAE x86 from Pentester Academy☆14Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- ☆24Updated 5 years ago
- Materials from different CTFs for later reuse☆22Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆34Updated last year
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆20Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 3 years ago
- Sources Codes of many Office Malwares☆16Updated 2 years ago
- ☆22Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- ☆11Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆17Updated last year
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- A small utility to deal with malware embedded hashes.☆48Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 3 years ago
- ☆22Updated 5 months ago
- Malicious Macro attack techniques for red teamers☆15Updated 3 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆29Updated 2 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago