monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (-80.91%)
ColdfireGolang malware development framework
Stars: ✭ 309 (-84.63%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (-66.38%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-95.57%)
CryptskyA simple, fully python ransomware PoC
Stars: ✭ 304 (-84.88%)
hostsA command line hosts file editor in one portable script.
Stars: ✭ 145 (-92.79%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-98.41%)
kiteshieldPacker/Protector for x86-64 ELF binaries on Linux
Stars: ✭ 71 (-96.47%)
Phishing.databasePhishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Stars: ✭ 296 (-85.28%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (-98.66%)
YpsilonAutomated Use Case Testing
Stars: ✭ 135 (-93.29%)
Filterlist-for-AdGuard-or-PiHoleA very aggressive filter-list that consolidates over 370 lists for use in AdGuard Home, Pi-Hole or similar.
Stars: ✭ 349 (-82.65%)
MerlinMerlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Stars: ✭ 3,522 (+75.14%)
nekrosNekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
Stars: ✭ 84 (-95.82%)
Malware IocIndicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (-52.51%)
binary-auditing-solutionsLearn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
Stars: ✭ 61 (-96.97%)
Vxug PapersResearch code & papers from members of vx-underground.
Stars: ✭ 291 (-85.53%)
OrionServerAn open-source, centralized HTTPS botnet
Stars: ✭ 58 (-97.12%)
Coinhive BlockTo block the malware domains of coin-hive systemwide.
Stars: ✭ 85 (-95.77%)
mkpolyA simple polymorphic engine
Stars: ✭ 28 (-98.61%)
miraiThe Mirai malware modified for use on NCL/a virtual/simulated environment.
Stars: ✭ 32 (-98.41%)
Nt wrapperA wrapper library around native windows sytem APIs
Stars: ✭ 287 (-85.73%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (-91.45%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (-10.39%)
EAD AttackEAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
Stars: ✭ 34 (-98.31%)
Misp GalaxyClusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (-86.28%)
ThezooA repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Stars: ✭ 7,849 (+290.3%)
ipsetGolang wrapper of ipset.
Stars: ✭ 21 (-98.96%)
InvizzzibleInviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (-86.67%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (-79.07%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-95.82%)
Runpe In MemoryRun a Exe File (PE Module) in memory (like an Application Loader)
Stars: ✭ 249 (-87.62%)
Al KhaserPublic malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Stars: ✭ 3,573 (+77.67%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (-87.47%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-99.15%)
Malware SamplesMalware samples, analysis exercises and other interesting resources.
Stars: ✭ 241 (-88.02%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (-86.87%)
ElfparserCross Platform ELF analysis
Stars: ✭ 228 (-88.66%)
Mass RatBasic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-93.68%)
SimpleatorSimpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (-87.07%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (-89.16%)
Threatpursuit VmThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 814 (-59.52%)
BotnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+25.46%)
likers-blockerA browser extension to block all visible likers of a tweet. – say NO to hate speech!
Stars: ✭ 45 (-97.76%)
Telegram RatWindows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (-90%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-95.87%)
Hack-UtilsScript to facilitate different functions and checks
Stars: ✭ 27 (-98.66%)
PafishPafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Stars: ✭ 2,026 (+0.75%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-93.29%)
ThreadboatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-93.44%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (-95.08%)
FclFCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (-79.66%)
SwitHak.github.ioSwitHak' Security Place for my Opinions and Work
Stars: ✭ 30 (-98.51%)