Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-68.67%)
MalsubA Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (+271.08%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+257.83%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (-53.01%)
CryptskyA simple, fully python ransomware PoC
Stars: ✭ 304 (+266.27%)
showstopperShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (+59.04%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+687.95%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+267.47%)
Phishing.databasePhishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Stars: ✭ 296 (+256.63%)
dga-collectionA collection of known Domain Generation Algorithms
Stars: ✭ 61 (-26.51%)
Androidlife📔 CaMnter's android learning life and footprint.
Stars: ✭ 293 (+253.01%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+698.8%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+31.33%)
Vxug PapersResearch code & papers from members of vx-underground.
Stars: ✭ 291 (+250.6%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-1.2%)
ZeusNOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Stars: ✭ 1,043 (+1156.63%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+993.98%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (-43.37%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+648.19%)
Nt wrapperA wrapper library around native windows sytem APIs
Stars: ✭ 287 (+245.78%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (-55.42%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+40.96%)
FluxionFluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+3845.78%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (-44.58%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+636.14%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+362.65%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-45.78%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-14.46%)
CrypterCrypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Stars: ✭ 268 (+222.89%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (+84.34%)
Ultimate.hosts.blacklistThe Ultimate Unified Hosts file for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites. Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
Stars: ✭ 606 (+630.12%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (+85.54%)
Mr.sipSIP-Based Audit and Attack Tool
Stars: ✭ 266 (+220.48%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (-67.47%)
GivingstormInfection vector that bypasses AV, IDS, and IPS. (For now...)
Stars: ✭ 72 (-13.25%)
CCATK高度自动化CC脚本
Stars: ✭ 107 (+28.92%)
InfectpeInfectPE - Inject custom code into PE file [This project is not maintained anymore]
Stars: ✭ 266 (+220.48%)
triehashGenerator for order-preserving minimal perfect hash functions in C
Stars: ✭ 36 (-56.63%)
DemosDemos of various injection techniques found in malware
Stars: ✭ 582 (+601.2%)
unprotectUnprotect is a python tool for parsing PE malware and extract evasion techniques.
Stars: ✭ 75 (-9.64%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+216.87%)
debianopt-repoAdditional debian repository for awesome open-source projects.
Stars: ✭ 47 (-43.37%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-51.81%)
Anti-Debug-DBAnti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-75.9%)
T MvpAndroid AOP Architecture by Apt, AspectJ, Javassisit, based on Realm+Databinding+MVP+Retrofit+Rxjava2
Stars: ✭ 2,740 (+3201.2%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-1.2%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-33.73%)
AptmapA map displaying threat actors from the misp-galaxy
Stars: ✭ 17 (-79.52%)
Duckhunt🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (+365.06%)