NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (+22.73%)
best AI papers 2021A curated list of the latest breakthroughs in AI (in 2021) by release date with a clear video explanation, link to a more in-depth article, and code.
Stars: ✭ 2,740 (+2390.91%)
QilingQiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+2460%)
MemzA trojan made for Danooct1's User Made Malware Series.
Stars: ✭ 524 (+376.36%)
SpacecowWindows Rootkit written in Python
Stars: ✭ 81 (-26.36%)
Locky Stars: ✭ 61 (-44.55%)
DataAPTnotes data
Stars: ✭ 1,126 (+923.64%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-37.27%)
Turnoff Namuwiki조별과제 때마다 "나무위키 꺼라."라고 말하시는게 피곤하신 여러분을 위해 만들어진 Browser Extension, 나무위키를 꺼 드립니다.
Stars: ✭ 59 (-46.36%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+183.64%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+6.36%)
EngineDroidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (+250.91%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-84.55%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+5303.64%)
ips-bph-frameworkBLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a Command-and-Control (C&C) architecture
Stars: ✭ 21 (-80.91%)
BineeBinee: binary emulation environment
Stars: ✭ 408 (+270.91%)
FlashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (+4.55%)
SerpentineC++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+96.36%)
QlibQlib is an AI-oriented quantitative investment platform, which aims to realize the potential, empower the research, and create the value of AI technologies in quantitative investment. With Qlib, you can easily try your ideas to create better Quant investment strategies. An increasing number of SOTA Quant research works/papers are released in Qlib.
Stars: ✭ 7,582 (+6792.73%)
InvizzzibleInviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (+143.64%)
Neural Architecture Search With RlMinimal Tensorflow implementation of the paper "Neural Architecture Search With Reinforcement Learning" presented at ICLR 2017
Stars: ✭ 37 (-66.36%)
Android unpackerA (hopefully) generic unpacker for packed Android apps.
Stars: ✭ 320 (+190.91%)
rhinoAgile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (-55.45%)
Adamantium Thief🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (+157.27%)
showstopperShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (+20%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+139.09%)
TeleShadow2TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (-20%)
Lime RatLimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+502.73%)
Teleshadow3Telegram Desktop Session Stealer
Stars: ✭ 83 (-24.55%)
KeyPlexerCapstone: Keylogger Trojan
Stars: ✭ 32 (-70.91%)
MalScanA Simple PE File Heuristics Scanners
Stars: ✭ 41 (-62.73%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+537.27%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (+98.18%)
IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-12.73%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-25.45%)
ElfparserCross Platform ELF analysis
Stars: ✭ 228 (+107.27%)
GuidedLabellingExploiting Saliency for Object Segmentation from Image Level Labels, CVPR'17
Stars: ✭ 35 (-68.18%)
FidlA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (+190%)
adageData and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Stars: ✭ 61 (-44.55%)
Dnc TensorflowA TensorFlow implementation of DeepMind's Differential Neural Computers (DNC)
Stars: ✭ 587 (+433.64%)
Anti-Debug-DBAnti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-81.82%)
Research Paper NotesNotes and Summaries on ML-related Research Papers (with optional implementations)
Stars: ✭ 218 (+98.18%)
Research In ProductionA collection of research papers categorized by real-world systems that enact them
Stars: ✭ 205 (+86.36%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (+282.73%)
Acl Paperspaper summary of Association for Computational Linguistics
Stars: ✭ 189 (+71.82%)
tnb-analysisGain insights about thenewboston digital crypto currency network by doing some analysis
Stars: ✭ 24 (-78.18%)
Tidyversity🎓 Tidy tools for academics
Stars: ✭ 155 (+40.91%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+177.27%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-59.09%)