All Projects β†’ fabacab β†’ Awesome Malware

fabacab / Awesome Malware

πŸ’»βš οΈ A curated collection of awesome malware, botnets, and other post-exploitation tools.

Projects that are alternatives of or similar to Awesome Malware

Malware-Machine-Learning
Malware Machine Learning
Stars: ✭ 26 (-75.93%)
Mutual labels:  malware, cybersecurity
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+5236.11%)
Mutual labels:  malware, cybersecurity
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-15.74%)
Mutual labels:  malware, cybersecurity
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+98.15%)
Mutual labels:  malware, cybersecurity
Robust Adv Malware Detection
Code repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-41.67%)
Mutual labels:  malware, cybersecurity
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+6598.15%)
Mutual labels:  malware, cybersecurity
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+187.96%)
Mutual labels:  malware, cybersecurity
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (-83.33%)
Mutual labels:  malware, cybersecurity
Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+465.74%)
Mutual labels:  malware, cybersecurity
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+287.96%)
Mutual labels:  malware, post-exploitation
who and what to follow
Who and what to follow in the world of cyber security
Stars: ✭ 124 (+14.81%)
Mutual labels:  malware, cybersecurity
Awesome Cybersecurity
Curated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-28.7%)
Mutual labels:  malware, cybersecurity
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+525.93%)
Mutual labels:  malware, cybersecurity
aurora
Malware similarity platform with modularity in mind.
Stars: ✭ 70 (-35.19%)
Mutual labels:  malware, cybersecurity
awesome-executable-packing
A curated list of awesome resources related to executable packing
Stars: ✭ 720 (+566.67%)
Mutual labels:  malware, cybersecurity
Malsub
A Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (+185.19%)
Mutual labels:  malware, cybersecurity
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+160.19%)
Mutual labels:  malware, cybersecurity
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-61.11%)
Mutual labels:  malware, cybersecurity
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Stars: ✭ 380 (+251.85%)
Mutual labels:  malware, cybersecurity
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-36.11%)
Mutual labels:  malware, cybersecurity

Awesome Malware Awesome

A curated collection of awesome malware, botnets, and other post-exploitation tools.

Malware is software intentionally designed to cause damage or provide unauthorized access to a computer, server, or computer network. While not exclusive, this list is heavily biased towards Free Software projects. For pre-exploitation TTPs, see awesome-pentest. For defenses, see awesome-cybersecurity-blueteam.

Your contributions and suggestions are heartilyβ™₯ welcome. (βœΏβ—•β€Ώβ—•). Please check the Contributing Guidelines for more details. This work is licensed under a Creative Commons Attribution 4.0 International License.

⚠️ πŸ“ Please note that this compilation is intended for educational and demonstration purposes only.

Contents

Analysis and reverse engineering

See awesome-malware-analysis.

  • theZoo - Repository of live malwares for your own joy and pleasure, created to make the possibility of malware analysis open and available to the public.

Banking trojans

🚧 TK-TODO

Botnets

  • Idisagree - Control remote computers using Discord bot and Python 3.

Command and Control

(Also known as C2 and C&C.)

  • Browser Exploitation Framework (BeEF) - Command and control server for delivering exploits to commandeered Web browsers.
  • Merlin - Cross-platform post-exploitation HTTP/2 command and control server and agent written in golang.
  • SILENTTRINITY - Asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR.

Credential Stuffing Account Checkers

Also known as Account Takeover (ATO) or account cracking.

  • Black Bullet - Single-threaded account checker with captcha bypass features and Selenium WebDriver support, sold for about $30 to $50. (Reference)
  • Private Keeper - Russian language account checker and takeover tool, sold at prices starting from approximately $1 USD.
  • SNIPR - Windows toolkit for credential stuffing across Web (HTTP/S) and email (IMAP) attack surfaces with the ability to encrypt and re-sell ATO configurations, sold for about $20.
  • STORM - Flexible account checker with Cloudflare protection bypass features written in C#. (Reference)
  • Sentry MBA - Among the oldest and longest in-use account checkers, using OCR for captcha bypass but unable to pass JavaScript anti-bot challenges, sold for between $5 and $20 per configuration file. (Reference)
  • Woxy - Email account checker with built-in support for automating password reset and searching email content for valuable information, now cracked and available free of charge. (Reference)

Data stealers

🚧 TK-TODO

Evasion

  • CheckPlease - Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.

Keyloggers

  • TechNowLogger - Windows/Linux keylogger generator which sends key-logs via email with other juicy target info.

Phishing kits

(Also known as phishkits, one word.)

  • ActorExpose/PhishKits - Collection of phishing kits provided to the public to make the Internet a safer environment.

RAM scrapers

🚧

See RamScraper for now.

Ransomware

🚧 TK-TODO

Remote Administration Tools (RATs)

Some Command and Control tools also overlap with RAT software.

(Also known as Remote Access Trojan or post-exploitation agent.)

  • Bella - Pure Python post-exploitation data mining and remote administration tool for macOS.
  • Empire - Pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture.
  • EvilOSX - Modular RAT that uses numerous evasion and exfiltration techniques out-of-the-box.
  • Pupy - Low-footprint, cross-platform (Windows, Linux, macOS, Android) RAT featuring all-in-memory execution guideline written in Python.
  • RedPeanut - Small RAT developed in .Net Core 2 and its agent in .Net 3.5/4.0, weaponized with several additional utilities.
  • Slackor - Golang implant that uses Slack as a command and control server.
  • Twittor - Stealthy Python based backdoor that uses Twitter (Direct Messages) as a command and control server.

Rootkits

  • Adore-NG - Rootkit adapted for the 2.6 and 3.x Linux kernels.
  • AdoreForAndroid - Adore rootkit ported to Android.
  • Diamorphine - LKM rootkit for Linux Kernels 2.6.x, 3.x, and 4.x.
  • Masochist - Framework for creating XNU based rootkits useful in OS X and iOS security research.
  • Vector-EDK - Commercial UEFI rootkit illegally sold by Hacking Team to numerous governments, leaked by hacker Phineas Phisher in 2015, and the basis of the MosaicRegressor rootkit.
  • vlany - Linux LD_PRELOAD rootkit.

Web Shells

(Also known as webshells, one word.)

  • BlackArch Webshells Collection - Various webshells that can be installed as a package on BlackArch Linux.
  • DAws - Advanced Web shell.
  • PHP-backdoors - Collection of PHP backdoors, for educational and/or testing purposes only.
  • PHP Exploit Scripts - Collection of PHP exploit scripts (often but not necessarily always backdoors or web shells), found when investigating hacked servers.
  • PHP WebShells collection - Repository of common PHP Web shells, somewhat dated.
  • PhpSploit - Remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server.
  • SharPyShell - Tiny and obfuscated ASP.NET webshell for C# web applications.
  • SecLists Web Shells - Examples of core Web shell functionality in PHP, JSP, ASP(X), ColdFusion, and more.
  • Weevely - Extensible PHP Web shell with numerous out-of-the-box modules.

License

CC-BY

This work is licensed under a Creative Commons Attribution 4.0 International License.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].