LOLBAS222APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (+20.48%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-40.96%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+12349.4%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+714.46%)
DataAPTnotes data
Stars: ✭ 1,126 (+1256.63%)
Eddsa Fault AttackFault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (-36.14%)
TeleratTelegram RAT written in Python
Stars: ✭ 56 (-32.53%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+10720.48%)
AngststealerAngst is the first python malware to have its own plugin system allowing for quick and easy account takeover. Along with its ability for easy plugin integration it has incredibly low detections.
Stars: ✭ 44 (-46.99%)
Python AptThis is a Python library interface to libapt, which allows you to query and manipulat APT package repository information using the Python programming language.
Stars: ✭ 54 (-34.94%)
Absent LoaderExample Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic level
Stars: ✭ 54 (-34.94%)
MalwareMalware related code
Stars: ✭ 51 (-38.55%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-13.25%)
PecliCLI tool to analyze PE files
Stars: ✭ 46 (-44.58%)
Locky Stars: ✭ 61 (-26.51%)
SpacecowWindows Rootkit written in Python
Stars: ✭ 81 (-2.41%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+1090.36%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-16.87%)
Rx.observeTransform any method to an Rx Observable ! (VIPER)
Stars: ✭ 34 (-59.04%)
Virustotal ToolsSubmits multiple domains to VirusTotal API
Stars: ✭ 29 (-65.06%)
BlocklistsaggregatorA Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-75.9%)
SentelloSentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
Stars: ✭ 54 (-34.94%)
Google ratA Remote Access Tool using Google Apps Script as the proxy for command and control.
Stars: ✭ 64 (-22.89%)
S Mvp🔥🔥优化版MVP,使用注解泛型简化代码编写,使用模块化协议方便维护,APT过程使用注解解析器利用JavaPoet🌝完成重复模块的编写,利用ASpect+GradlePlugin 完成横向AOP编程+Javassist动态字节码注入+Tinker实现热修复+Retrofit实现优雅网络操作+RxJava轻松玩转数据处理
Stars: ✭ 1,095 (+1219.28%)
MoliorMolior - Debian Build System
Stars: ✭ 53 (-36.14%)
Robust Adv Malware DetectionCode repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-24.1%)
ZeusNOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Stars: ✭ 1,043 (+1156.63%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-45.78%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-13.25%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-51.81%)
Xor crypterXOR encryption, malware crypter
Stars: ✭ 59 (-28.92%)
NorimaciNorimaci is a simple and lightweight malware analysis sandbox for macOS
Stars: ✭ 37 (-55.42%)
Teleshadow3Telegram Desktop Session Stealer
Stars: ✭ 83 (+0%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-61.45%)
Esp8266 deautherAffordable WiFi hacking platform for testing and learning
Stars: ✭ 9,312 (+11119.28%)
Malware IocIndicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (+1050.6%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-75.9%)
EvilclippyA cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
Stars: ✭ 1,224 (+1374.7%)
ThezooA repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Stars: ✭ 7,849 (+9356.63%)
SpybrowseCode developed to steal certain browser config files (history, preferences, etc)
Stars: ✭ 57 (-31.33%)
Recipes🍰 The main recipes repository for UNI. You can create your own or use one of the available recipes in here.
Stars: ✭ 13 (-84.34%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+939.76%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1263.86%)
CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-32.53%)
Wi PwnESP8266 Deauther with a material design WebUI 📶
Stars: ✭ 839 (+910.84%)
Easymessenger一款Android平台上基于Binder的IPC进程间通信库
Stars: ✭ 24 (-71.08%)