CleanUnwantedUpdatesA set of scripts to detect updates of Microsoft (TM) Windows (TM) OS which harm users' privacy and uninstall them
Stars: ✭ 24 (-76%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+785%)
DNS-FenderA Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-53%)
ansible-aptAnsible role to manage packages and up(date|grade)s in Debian-like systems
Stars: ✭ 21 (-79%)
UnpackersMy collection of unpackers for malware packers/crypters
Stars: ✭ 25 (-75%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-73%)
SpywarePython-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (-69%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-74%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+197%)
ccapiA header-only C++ library for interacting with crypto exchanges. Binding for Python is provided. A spot market making application is also provided as an end-to-end solution for liquidity providers.
Stars: ✭ 227 (+127%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (-61%)
Static-Malware-AnalysesA open source Python script to perform static analysis on a Malware Binary File (portable executable).
Stars: ✭ 15 (-85%)
showstopperShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (+32%)
Anti-Debug-DBAnti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-80%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+205%)
pihole-blocklistsDomain blocklists for Pi-Hole that are free and open for use by everyone.
Stars: ✭ 13 (-87%)
dga-collectionA collection of known Domain Generation Algorithms
Stars: ✭ 61 (-39%)
scam-linksCollection of phishing and malicious links that focuses on Steam and Discord scams.
Stars: ✭ 118 (+18%)
byeintegrity5-uacBypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (-79%)
package-buildA toolset for building system packages using Docker and fpm-cookery
Stars: ✭ 36 (-64%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+9%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-18%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+808%)
ThreadBoatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 162 (+62%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (-53%)
PyPackerDetectA malware dataset curation tool which helps identify packed samples.
Stars: ✭ 27 (-73%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (-63%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+17%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+7134%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (-54%)
impfuzzyFuzzy Hash calculated from import API of PE files
Stars: ✭ 67 (-33%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+284%)
r2yarar2yara - Module for Yara using radare2 information
Stars: ✭ 30 (-70%)
malice-avMalice AntiVirus Plugins
Stars: ✭ 98 (-2%)
decrypticonJava-layer Android Malware Simplifier
Stars: ✭ 17 (-83%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (+10%)
termux-xit is unofficial repository maintained by me @Hax4us. you can check available packages in README
Stars: ✭ 87 (-13%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-29%)
malware-writeupsPersonal research and publication on malware families
Stars: ✭ 104 (+4%)
EasyJob🔨 EasyJob - keep and execute your PowerShell and BAT scripts from one interface
Stars: ✭ 228 (+128%)
rc4md5cryrc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
Stars: ✭ 15 (-85%)
memscrimperCode for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"
Stars: ✭ 25 (-75%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (+54%)
HomebrewOverlayBrowser extension adware (showHomebrewOverlayOuter)
Stars: ✭ 52 (-48%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (-73%)
jetabrooth.github.io/jeta
Stars: ✭ 21 (-79%)
QuiescisQuescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (-44%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-45%)
macOS-Security-UpdatesNotifies the user when macOS Security components like Gatekeeper and XProtect have been updated
Stars: ✭ 53 (-47%)