IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-14.29%)
Macro packmacro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
Stars: ✭ 1,072 (+857.14%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-14.29%)
MalwareMalware related code
Stars: ✭ 51 (-54.46%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-6.25%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+7918.75%)
AvdetectionA simple way for detection the remote user's antivirus
Stars: ✭ 82 (-26.79%)
ZeusNOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Stars: ✭ 1,043 (+831.25%)
PecliCLI tool to analyze PE files
Stars: ✭ 46 (-58.93%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (-17.86%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-26.79%)
DroidjackEste troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Stars: ✭ 44 (-60.71%)
AngststealerAngst is the first python malware to have its own plugin system allowing for quick and easy account takeover. Along with its ability for easy plugin integration it has incredibly low detections.
Stars: ✭ 44 (-60.71%)
ApkidAndroid Application Identifier for Packers, Protectors, Obfuscators and Oddities - PEiD for Android
Stars: ✭ 999 (+791.96%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-3.57%)
Powershell Reverse Http😇 A Powershell exploit service that opens a reverse http connection via meterpreter
Stars: ✭ 104 (-7.14%)
Malware scriptsVarious scripts for different malware families
Stars: ✭ 91 (-18.75%)
GhostGhost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+785.71%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+782.14%)
EvilclippyA cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
Stars: ✭ 1,224 (+992.86%)
NorimaciNorimaci is a simple and lightweight malware analysis sandbox for macOS
Stars: ✭ 37 (-66.96%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-71.43%)
Clamav DevelClamAV Development - FAQ is here: https://github.com/Cisco-Talos/clamav-faq
Stars: ✭ 1,301 (+1061.61%)
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-28.57%)
WinpayloadsUndetectable Windows Payload Generation
Stars: ✭ 1,211 (+981.25%)
Malware IocIndicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (+752.68%)
MalwarepersistencescriptsA collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-8.04%)
InjectallthethingsSeven different DLL injection techniques in one single project.
Stars: ✭ 1,297 (+1058.04%)
Awesome CybersecurityCurated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-31.25%)
Virustotal ToolsSubmits multiple domains to VirusTotal API
Stars: ✭ 29 (-74.11%)
DefendercheckIdentifies the bytes that Microsoft Defender flags on.
Stars: ✭ 942 (+741.07%)
Orwell Rat And BotnetOrwell is a RAT and Botnet designed as a trio of programs by Landon Powell.
Stars: ✭ 27 (-75.89%)
SkyratSkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-81.25%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+1048.21%)
BlocklistsaggregatorA Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-82.14%)
Docker MailserverProduction-ready fullstack but simple mail server (SMTP, IMAP, LDAP, Antispam, Antivirus, etc.) running inside a container.
Stars: ✭ 8,115 (+7145.54%)
ThezooA repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Stars: ✭ 7,849 (+6908.04%)
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+670.54%)
Malconfscan With CuckooCuckoo Sandbox plugin for extracts configuration data of known malware
Stars: ✭ 110 (-1.79%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+9125.89%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (-11.61%)
ClientWindows, OS X and linux RAT client
Stars: ✭ 89 (-20.54%)
TewqOpen-Source Remote Administration Tool for Windows. 100% FUD Without any Crypter
Stars: ✭ 75 (-33.04%)
Ripv6Random IPv6 - circumvents restrictive IP address-based filter and blocking rules
Stars: ✭ 10 (-91.07%)
Hrscan2A self-hosted drag-and-drop, nosql yet fully-featured file-scanning server.
Stars: ✭ 25 (-77.68%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-35.71%)
Venomvenom - shellcode generator/compiler/handler (metasploit)
Stars: ✭ 904 (+707.14%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-20.54%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-38.39%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-84.82%)
Asyncrat C SharpOpen-Source Remote Administration Tool For Windows C# (RAT)
Stars: ✭ 819 (+631.25%)
Threatpursuit VmThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 814 (+626.79%)