clamfsClamFS is a FUSE-based user-space file system for Linux and BSD with on-access anti-virus file scanning
Stars: ✭ 29 (-53.97%)
Threat HuntingPersonal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (+247.62%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (-57.14%)
shellsumA defense tool - detect web shells in local directories via md5sum
Stars: ✭ 30 (-52.38%)
DNSWhotransmit cs beacon (shellcode) over self-made dns to avoid anti-kill and AV
Stars: ✭ 47 (-25.4%)
ClamAV.ManagedClamAV bindings for the .NET Framework, Mono and PowerShell. ClamAV.Managed is a library written in C# for the .NET Framework and Mono, providing managed bindings for the libclamav interface. It includes ClamAV.Managed.PowerShell, a set of PowerShell cmdlets for ClamAV scanning. It comes with sample code for building a GUI virus scanner applicat…
Stars: ✭ 15 (-76.19%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (+246.03%)
SerpentineC++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+242.86%)
Simple-Antirootkit-SST-UnhookerThis is a demo project to illustrate the way to verify and restore original SST in case of some malware hooks
Stars: ✭ 31 (-50.79%)
Runpe In MemoryRun a Exe File (PE Module) in memory (like an Application Loader)
Stars: ✭ 249 (+295.24%)
AdflyUrlGrabberA python script designed to grab the original url from an adfly url without opening it :D
Stars: ✭ 53 (-15.87%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (+300%)
Malware SamplesMalware samples, analysis exercises and other interesting resources.
Stars: ✭ 241 (+282.54%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (-41.27%)
Open MyrtusRCEed version of computer malware / rootkit MyRTUs / Stuxnet.
Stars: ✭ 208 (+230.16%)
binary-auditing-solutionsLearn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
Stars: ✭ 61 (-3.17%)
AV-KillerAntivirus Killer
Stars: ✭ 91 (+44.44%)
angr-antievasionFinal project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).
Stars: ✭ 35 (-44.44%)
MemtriageAllows you to quickly query a Windows machine for RAM artifacts
Stars: ✭ 200 (+217.46%)
BotnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+3904.76%)
BetterDiscordPlugins🔥 My collection of Discord plugins for BetterDiscord, the Discord enhancement project
Stars: ✭ 120 (+90.48%)
Telegram RatWindows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (+219.05%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+85.71%)
Process doppelgangingMy implementation of enSilo's Process Doppelganging (PE injection technique)
Stars: ✭ 198 (+214.29%)
Me-e--bypasserThis Discord Bot bypasses a premium feature of the Bot Mee6, so that you can use it for free.
Stars: ✭ 74 (+17.46%)
QilingQiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+4369.84%)
BlackwebDomains Blocklist for Squid-Cache
Stars: ✭ 189 (+200%)
gateCrackerNo description or website provided.
Stars: ✭ 20 (-68.25%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+328.57%)
ML-AntivirusAn antivirus powered by machine learning.
Stars: ✭ 32 (-49.21%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+509.52%)
OrcaAdvanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions ! (uncompleted)
Stars: ✭ 184 (+192.06%)
Unified Hosts AutoupdateQuickly and easily install, uninstall, and set up automatic updates for any of Steven Black's unified hosts files.
Stars: ✭ 185 (+193.65%)
mkpolyA simple polymorphic engine
Stars: ✭ 28 (-55.56%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (+182.54%)
Trisis Triton HatmanRepository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
Stars: ✭ 178 (+182.54%)
sarlaccSMTP server / sinkhole for collecting spam
Stars: ✭ 42 (-33.33%)
LisaSandbox for automated Linux malware analysis.
Stars: ✭ 177 (+180.95%)
EnergizedprotectionA merged collection of hosts from reputable sources. #StayEnergized!
Stars: ✭ 175 (+177.78%)
ipsourcebypassThis Python script can be used to bypass IP source restrictions using HTTP headers.
Stars: ✭ 326 (+417.46%)
AnteaterAnteater - CI/CD Gate Check Framework
Stars: ✭ 174 (+176.19%)
bank mitigationsAnti keylogger, anti screen logger... Strategy to protect with hookings or improve your sandbox with spyware detection... - Demo
Stars: ✭ 17 (-73.02%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+973.02%)
EvasionsEvasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Stars: ✭ 173 (+174.6%)
Misp TaxonomiesTaxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (+166.67%)
Nginx Ultimate Bad Bot BlockerNginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
Stars: ✭ 2,351 (+3631.75%)
malware api classMalware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers
Stars: ✭ 134 (+112.7%)
DdoorDDoor - cross platform backdoor using dns txt records
Stars: ✭ 168 (+166.67%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (+155.56%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+12.7%)
Judge-Jury-and-ExecutableA file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+4.76%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+147.62%)
miraiThe Mirai malware modified for use on NCL/a virtual/simulated environment.
Stars: ✭ 32 (-49.21%)
Flare FlossFLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.
Stars: ✭ 2,020 (+3106.35%)
Docker MispAutomated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
Stars: ✭ 148 (+134.92%)