vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (-42.48%)
Absent LoaderExample Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic level
Stars: ✭ 54 (-79.7%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+45.49%)
apooxmlGenerate YARA rules for OOXML documents.
Stars: ✭ 34 (-87.22%)
SerpentineC++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (-18.8%)
SwitHak.github.ioSwitHak' Security Place for my Opinions and Work
Stars: ✭ 30 (-88.72%)
MalwareMalware related code
Stars: ✭ 51 (-80.83%)
Open MyrtusRCEed version of computer malware / rootkit MyRTUs / Stuxnet.
Stars: ✭ 208 (-21.8%)
Anti-Debug-DBAnti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-92.48%)
kiteshieldPacker/Protector for x86-64 ELF binaries on Linux
Stars: ✭ 71 (-73.31%)
SafebrowsingSafe Browsing API Go Client
Stars: ✭ 352 (+32.33%)
MemtriageAllows you to quickly query a Windows machine for RAM artifacts
Stars: ✭ 200 (-24.81%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (+28.2%)
MalconfscanVolatility plugin for extracts configuration data of known malware
Stars: ✭ 327 (+22.93%)
Android unpackerA (hopefully) generic unpacker for packed Android apps.
Stars: ✭ 320 (+20.3%)
Unified Hosts AutoupdateQuickly and easily install, uninstall, and set up automatic updates for any of Steven Black's unified hosts files.
Stars: ✭ 185 (-30.45%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+17.29%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (-33.08%)
ColdfireGolang malware development framework
Stars: ✭ 309 (+16.17%)
RansomwareCrypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.
Stars: ✭ 19 (-92.86%)
CryptskyA simple, fully python ransomware PoC
Stars: ✭ 304 (+14.29%)
LisaSandbox for automated Linux malware analysis.
Stars: ✭ 177 (-33.46%)
Phishing.databasePhishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Stars: ✭ 296 (+11.28%)
malware-writeupsPersonal research and publication on malware families
Stars: ✭ 104 (-60.9%)
Ghostshell Malware indetectable, with AV bypass techniques, anti-disassembly, etc.
Stars: ✭ 293 (+10.15%)
AnteaterAnteater - CI/CD Gate Check Framework
Stars: ✭ 174 (-34.59%)
MedusaBinary instrumentation framework based on FRIDA
Stars: ✭ 258 (-3.01%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (-77.82%)
Misp TaxonomiesTaxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (-36.84%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+3276.32%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (-89.85%)
ZeusNOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Stars: ✭ 1,043 (+292.11%)
memscrimperCode for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"
Stars: ✭ 25 (-90.6%)
DdoorDDoor - cross platform backdoor using dns txt records
Stars: ✭ 168 (-36.84%)
CommunityVolatility plugins developed and maintained by the community
Stars: ✭ 252 (-5.26%)
BinnaviBinNavi is a binary analysis IDE that allows to inspect, navigate, edit and annotate control flow graphs and call graphs of disassembled code.
Stars: ✭ 2,781 (+945.49%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (-41.35%)
Flare VmNo description or website provided.
Stars: ✭ 3,201 (+1103.38%)
macOS-Security-UpdatesNotifies the user when macOS Security components like Gatekeeper and XProtect have been updated
Stars: ✭ 53 (-80.08%)
PokeredDisassembly of Pokémon Red/Blue
Stars: ✭ 2,924 (+999.25%)
Flare FlossFLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Stars: ✭ 2,020 (+659.4%)
Yolo😈Scripts or demo projects on iOS development or reverse engineering
Stars: ✭ 245 (-7.89%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-45.86%)
WtfjhOne-step iOS binary runtime instrumentation for the lazy ones
Stars: ✭ 265 (-0.38%)
Remot3dRemot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-1.13%)
Rec98The Touhou PC-98 Restoration Project
Stars: ✭ 259 (-2.63%)
M-BotnetA C2 project that controls a self-propagating MS17-010 worm.
Stars: ✭ 39 (-85.34%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-81.58%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-71.8%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-93.23%)
AngststealerAngst is the first python malware to have its own plugin system allowing for quick and easy account takeover. Along with its ability for easy plugin integration it has incredibly low detections.
Stars: ✭ 44 (-83.46%)