rkorovald_preload userland rootkit
Stars: ✭ 34 (+41.67%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (+95.83%)
Wireguard-DNScrypt-VPN-ServerFast setup wireguard server script, with dnscrypt and adblocking, maleware blocking, more blocking if you need. Use case eg. always on vpn and adblocking on ios or android, and be more secured in unknown networks.
Stars: ✭ 48 (+100%)
SpywarePython-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (+29.17%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+387.5%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+358.33%)
sarlaccSMTP server / sinkhole for collecting spam
Stars: ✭ 42 (+75%)
decrypticonJava-layer Android Malware Simplifier
Stars: ✭ 17 (-29.17%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+195.83%)
QuiescisQuescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (+133.33%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (+537.5%)
CleanUnwantedUpdatesA set of scripts to detect updates of Microsoft (TM) Windows (TM) OS which harm users' privacy and uninstall them
Stars: ✭ 24 (+0%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (+12.5%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (+4204.17%)
BotnetRemote Access Tool, Command & Control, based on the github project Ares, but written in python 3 with some extra features.
Stars: ✭ 26 (+8.33%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+1516.67%)
binary-auditing-solutionsLearn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
Stars: ✭ 61 (+154.17%)
XENAXENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ulti…
Stars: ✭ 127 (+429.17%)
OrionServerAn open-source, centralized HTTPS botnet
Stars: ✭ 58 (+141.67%)
Anti-Debug-DBAnti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-16.67%)
mkpolyA simple polymorphic engine
Stars: ✭ 28 (+16.67%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+3587.5%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+1070.83%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (+312.5%)
rust botnetTelegraph botnet written in Rust
Stars: ✭ 15 (-37.5%)
fame modulesCommunity modules for FAME
Stars: ✭ 55 (+129.17%)
miraiThe Mirai malware modified for use on NCL/a virtual/simulated environment.
Stars: ✭ 32 (+33.33%)
HomebrewOverlayBrowser extension adware (showHomebrewOverlayOuter)
Stars: ✭ 52 (+116.67%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (+162.5%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+187.5%)
Static-Malware-AnalysesA open source Python script to perform static analysis on a Malware Binary File (portable executable).
Stars: ✭ 15 (-37.5%)
winagentWindows agent for Tactical RMM
Stars: ✭ 20 (-16.67%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (+8.33%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (+1654.17%)
mobileAuditDjango application that performs SAST and Malware Analysis for Android APKs
Stars: ✭ 140 (+483.33%)
Ddos RootsecDDOS Archive by RootSec (Scanners, BotNets (Mirai and QBot Premium & Normal and more), Exploits, Methods, Sniffers)
Stars: ✭ 108 (+350%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+87.5%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+5675%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+1170.83%)
KratosknifeKratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (+304.17%)
AoyamaA New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Stars: ✭ 161 (+570.83%)
Owasp Mth3l3m3nt FrameworkOWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web using the web as well as pentest on the go through its responsive interface.
Stars: ✭ 139 (+479.17%)
Javascript-Botnet-C-SharpThis is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets
Stars: ✭ 22 (-8.33%)
Botnet LabAn IRC based tool for testing the capabilities of a botnet.
Stars: ✭ 123 (+412.5%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+1162.5%)
B1tifissh management tool to provides commandline access to a remote system running SSH server
Stars: ✭ 65 (+170.83%)
ThreadBoatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 162 (+575%)
Aura BotnetA super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell.
Stars: ✭ 95 (+295.83%)
dga-collectionA collection of known Domain Generation Algorithms
Stars: ✭ 61 (+154.17%)
Bold-Falcon毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;方班网络安全综合实验-设计类;
Stars: ✭ 30 (+25%)
MiraiMirai related codes and stuff
Stars: ✭ 42 (+75%)
Postfwd Anti Geoip Spam PluginPostfwd plugin for blocking international spam botnets based on geographical location of IP addresses used to login to postfix via sasl.
Stars: ✭ 40 (+66.67%)
DiskoverFile system crawler, disk space usage, file search engine and file system analytics powered by Elasticsearch
Stars: ✭ 977 (+3970.83%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+30041.67%)
botnetA tcp botnet written in golang
Stars: ✭ 77 (+220.83%)
blockchain c2cA Proof of Concept to show how blockchain can solve C2C persistence. PoC originally presented at EuskalHack Security Congress 2017, updated and improved for Cybercamp 2017.
Stars: ✭ 21 (-12.5%)