WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+4451.98%)
MalwaremultiscanSelf-hosted VirusTotal / MetaDefender wannabe with API, demo UI and Scanners running in Docker.
Stars: ✭ 204 (-10.13%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-52.42%)
Docker MispAutomated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
Stars: ✭ 148 (-34.8%)
AvpwnList of real-world threats against endpoint protection software
Stars: ✭ 179 (-21.15%)
RelocbonusAn obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.
Stars: ✭ 106 (-53.3%)
Ransom0Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.
Stars: ✭ 105 (-53.74%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (-36.56%)
MalwarepersistencescriptsA collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-54.63%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (-3.96%)
Covid19 ReviewA collaborative review of the emerging COVID-19 literature. Join the chat here:
Stars: ✭ 102 (-55.07%)
Blocklist Ipsetsipsets dynamically updated with firehol's update-ipsets.sh script
Stars: ✭ 2,011 (+785.9%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (-56.39%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (-56.39%)
PafishPafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Stars: ✭ 2,026 (+792.51%)
IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-57.71%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-57.71%)
Trisis Triton HatmanRepository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
Stars: ✭ 178 (-21.59%)
IllacceptanythingThe project where literally anything* goes.
Stars: ✭ 1,756 (+673.57%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (-59.47%)
Malware scriptsVarious scripts for different malware families
Stars: ✭ 91 (-59.91%)
VxsigAutomatically generate AV byte signatures from sets of similar binaries.
Stars: ✭ 139 (-38.77%)
Clamav DevelClamAV Development - FAQ is here: https://github.com/Cisco-Talos/clamav-faq
Stars: ✭ 1,301 (+473.13%)
InjectallthethingsSeven different DLL injection techniques in one single project.
Stars: ✭ 1,297 (+471.37%)
MemtriageAllows you to quickly query a Windows machine for RAM artifacts
Stars: ✭ 200 (-11.89%)
LisaSandbox for automated Linux malware analysis.
Stars: ✭ 177 (-22.03%)
Sheep WolfWolves Among the Sheep
Stars: ✭ 138 (-39.21%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-60.79%)
MalwoverviewMalwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox and it is able to scan Android devices against VT and HA.
Stars: ✭ 1,276 (+462.11%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-40.53%)
Coinhive BlockTo block the malware domains of coin-hive systemwide.
Stars: ✭ 85 (-62.56%)
1hostsDNS filter-/blocklists | safe. private. clean. browsing!
Stars: ✭ 85 (-62.56%)
EnergizedprotectionA merged collection of hosts from reputable sources. #StayEnergized!
Stars: ✭ 175 (-22.91%)
YpsilonAutomated Use Case Testing
Stars: ✭ 135 (-40.53%)
Hrcloud2A full-featured home hosted Cloud Drive, Personal Assistant, App Launcher, File Converter, Streamer, Share Tool & More!
Stars: ✭ 134 (-40.97%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-63%)
Process doppelgangingMy implementation of enSilo's Process Doppelganging (PE injection technique)
Stars: ✭ 198 (-12.78%)
AnteaterAnteater - CI/CD Gate Check Framework
Stars: ✭ 174 (-23.35%)
AmsiscannerA C/C++ implementation of Microsoft's Antimalware Scan Interface
Stars: ✭ 134 (-40.97%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-63.44%)
Teleshadow3Telegram Desktop Session Stealer
Stars: ✭ 83 (-63.44%)
Docker ClamavMulti-arch dockerized open source antivirus for use with file sharing containers, REST API or TCP.
Stars: ✭ 133 (-41.41%)
AvdetectionA simple way for detection the remote user's antivirus
Stars: ✭ 82 (-63.88%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-63.88%)
Dnxfirewalldnxfirewall (dad's next-gen firewall), a pure Python next generation firewall built on top of Linux kernel/netfilter.
Stars: ✭ 174 (-23.35%)
UitkykRuntime memory analysis framework to identify Android malware
Stars: ✭ 133 (-41.41%)
SpacecowWindows Rootkit written in Python
Stars: ✭ 81 (-64.32%)
ThreadboatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-41.85%)
EvilclippyA cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
Stars: ✭ 1,224 (+439.21%)
WinpayloadsUndetectable Windows Payload Generation
Stars: ✭ 1,211 (+433.48%)
QilingQiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+1140.53%)
EvasionsEvasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Stars: ✭ 173 (-23.79%)
PracticalmalwarelabsKeep track of the labs from the book "Practical Malware Analysis"
Stars: ✭ 130 (-42.73%)