All Projects → cerberus_research → Similar Projects or Alternatives

1566 Open source projects that are alternatives of or similar to cerberus_research

Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (+22.73%)
Mutual labels:  malware, trojan
best AI papers 2021
A curated list of the latest breakthroughs in AI (in 2021) by release date with a clear video explanation, link to a more in-depth article, and code.
Stars: ✭ 2,740 (+2390.91%)
Mutual labels:  research, paper
Qiling
Qiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+2460%)
Mutual labels:  analysis, malware
Memz
A trojan made for Danooct1's User Made Malware Series.
Stars: ✭ 524 (+376.36%)
Mutual labels:  malware, trojan
Top 10 Computer Vision Papers 2020
A list of the top 10 computer vision papers in 2020 with video demos, articles, code and paper reference.
Stars: ✭ 132 (+20%)
Mutual labels:  research, paper
Spacecow
Windows Rootkit written in Python
Stars: ✭ 81 (-26.36%)
Mutual labels:  malware, trojan
Locky
Stars: ✭ 61 (-44.55%)
Mutual labels:  analysis, malware
Data
APTnotes data
Stars: ✭ 1,126 (+923.64%)
Mutual labels:  analysis, malware
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-37.27%)
Mutual labels:  malware, trojan
Turnoff Namuwiki
조별과제 때마다 "나무위키 꺼라."라고 말하시는게 피곤하신 여러분을 위해 만들어진 Browser Extension, 나무위키를 꺼 드립니다.
Stars: ✭ 59 (-46.36%)
Mutual labels:  research, paper
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+183.64%)
Mutual labels:  malware, trojan
flashmingo
Automatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+6.36%)
Mutual labels:  analysis, malware
Engine
Droidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (+250.91%)
Mutual labels:  malware, trojan
Brutus
A Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-84.55%)
Mutual labels:  malware, trojan
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+5303.64%)
Mutual labels:  malware, trojan
ips-bph-framework
BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a Command-and-Control (C&C) architecture
Stars: ✭ 21 (-80.91%)
Mutual labels:  analysis, malware
Binee
Binee: binary emulation environment
Stars: ✭ 408 (+270.91%)
Mutual labels:  analysis, malware
Flashmingo
Automatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (+4.55%)
Mutual labels:  analysis, malware
Serpentine
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+96.36%)
Mutual labels:  malware, trojan
Qlib
Qlib is an AI-oriented quantitative investment platform, which aims to realize the potential, empower the research, and create the value of AI technologies in quantitative investment. With Qlib, you can easily try your ideas to create better Quant investment strategies. An increasing number of SOTA Quant research works/papers are released in Qlib.
Stars: ✭ 7,582 (+6792.73%)
Mutual labels:  research, paper
Invizzzible
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (+143.64%)
Mutual labels:  research, malware
Neural Architecture Search With Rl
Minimal Tensorflow implementation of the paper "Neural Architecture Search With Reinforcement Learning" presented at ICLR 2017
Stars: ✭ 37 (-66.36%)
Mutual labels:  research, paper
Android unpacker
A (hopefully) generic unpacker for packed Android apps.
Stars: ✭ 320 (+190.91%)
Mutual labels:  research, malware
Browser Sec Whitepaper
Cure53 Browser Security White Paper
Stars: ✭ 251 (+128.18%)
Mutual labels:  research, paper
rhino
Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (-55.45%)
Mutual labels:  analysis, malware
Adamantium Thief
🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (+157.27%)
Mutual labels:  malware, trojan
showstopper
ShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (+20%)
Mutual labels:  research, malware
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (+139.09%)
Mutual labels:  malware, trojan
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (+285.45%)
Mutual labels:  malware, trojan
TeleShadow2
TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (-20%)
Mutual labels:  malware, trojan
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-85.45%)
Mutual labels:  malware, trojan
Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+502.73%)
Mutual labels:  malware, trojan
Teleshadow3
Telegram Desktop Session Stealer
Stars: ✭ 83 (-24.55%)
Mutual labels:  malware, trojan
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-70.91%)
Mutual labels:  malware, trojan
MalScan
A Simple PE File Heuristics Scanners
Stars: ✭ 41 (-62.73%)
Mutual labels:  analysis, malware
Automated-Malware-Analysis-List
My personal Automated Malware Analysis Sandboxes and Services
Stars: ✭ 20 (-81.82%)
Mutual labels:  analysis, malware
Manalyze
A static analyzer for PE executables.
Stars: ✭ 701 (+537.27%)
Mutual labels:  analysis, malware
Goat
🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (+98.18%)
Mutual labels:  malware, trojan
Illuminatejs
IlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-12.73%)
Mutual labels:  analysis, malware
Php Malware Analysis
Deobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-25.45%)
Mutual labels:  analysis, malware
Elfparser
Cross Platform ELF analysis
Stars: ✭ 228 (+107.27%)
Mutual labels:  analysis, malware
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (-83.64%)
Mutual labels:  malware, trojan
GuidedLabelling
Exploiting Saliency for Object Segmentation from Image Level Labels, CVPR'17
Stars: ✭ 35 (-68.18%)
Mutual labels:  research, paper
Whitecomet-Research
Research on malware creation and protection
Stars: ✭ 62 (-43.64%)
Mutual labels:  research, malware
Fidl
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 319 (+190%)
Mutual labels:  research, malware
adage
Data and code related to the paper "ADAGE-Based Integration of Publicly Available Pseudomonas aeruginosa..." Jie Tan, et al · mSystems · 2016
Stars: ✭ 61 (-44.55%)
Mutual labels:  research, paper
Dnc Tensorflow
A TensorFlow implementation of DeepMind's Differential Neural Computers (DNC)
Stars: ✭ 587 (+433.64%)
Mutual labels:  research, paper
Research Method
论文写作与资料分享
Stars: ✭ 436 (+296.36%)
Mutual labels:  research, paper
Research And Coding
研究资源列表 A curated list of research resources
Stars: ✭ 100 (-9.09%)
Mutual labels:  research, paper
Anti-Debug-DB
Anti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-81.82%)
Mutual labels:  research, malware
Research Paper Notes
Notes and Summaries on ML-related Research Papers (with optional implementations)
Stars: ✭ 218 (+98.18%)
Mutual labels:  research, paper
Research In Production
A collection of research papers categorized by real-world systems that enact them
Stars: ✭ 205 (+86.36%)
Mutual labels:  research, paper
FIDL
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (+282.73%)
Mutual labels:  research, malware
Acl Papers
paper summary of Association for Computational Linguistics
Stars: ✭ 189 (+71.82%)
Mutual labels:  research, paper
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (+245.45%)
Mutual labels:  malware, trojan
MalwareDatabase
One of the few malware collection
Stars: ✭ 37 (-66.36%)
Mutual labels:  malware, trojan
tnb-analysis
Gain insights about thenewboston digital crypto currency network by doing some analysis
Stars: ✭ 24 (-78.18%)
Mutual labels:  research, analysis
Tidyversity
🎓 Tidy tools for academics
Stars: ✭ 155 (+40.91%)
Mutual labels:  research, analysis
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+177.27%)
Mutual labels:  malware, trojan
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-59.09%)
Mutual labels:  malware, trojan
1-60 of 1566 similar projects