CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-44%)
PecliCLI tool to analyze PE files
Stars: ✭ 46 (-54%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+9%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+888%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-45%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-68%)
Malware IocIndicators of Compromises (IOC) of our various investigations
Stars: ✭ 955 (+855%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-55%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-18%)
ThezooA repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Stars: ✭ 7,849 (+7749%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-80%)
BrutusA Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-83%)
Threatpursuit VmThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 814 (+714%)
Physics CommandPhysics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-77%)
NeuraxA framework for constructing self-spreading binaries
Stars: ✭ 757 (+657%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+808%)
HblockImprove your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+624%)
CtiCyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+722%)
Lime RatLimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+563%)
ThreadBoatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 162 (+62%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (+588%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (-53%)
DhcpwnAll your IPs are belong to us.
Stars: ✭ 642 (+542%)
UboatHTTP Botnet Project
Stars: ✭ 573 (+473%)
PyPackerDetectA malware dataset curation tool which helps identify packed samples.
Stars: ✭ 27 (-73%)
Malware SamplesA collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
Stars: ✭ 565 (+465%)
Esp8266 beaconspamCreates up to a thousand WiFi access points with custom SSIDs.
Stars: ✭ 575 (+475%)
Lazy importerlibrary for importing functions from dlls in a hidden, reverse engineer unfriendly way
Stars: ✭ 544 (+444%)
HerculesHERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (+426%)
Buy pig plan电话攻击(电话轰炸、可代替短信轰炸)、留言攻击工具 | 已删库
Stars: ✭ 506 (+406%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+399%)
BitcrackerBitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (+363%)
MalwaresourcecodeCollection of malware source code for a variety of platforms in an array of different programming languages.
Stars: ✭ 8,666 (+8566%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (-63%)
Linux.miraiLeaked Linux.Mirai Source Code for Research/IoC Development Purposes
Stars: ✭ 466 (+366%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (+306%)
Box JsA tool for studying JavaScript malware.
Stars: ✭ 444 (+344%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+335%)
T MvpAndroid AOP Architecture by Apt, AspectJ, Javassisit, based on Realm+Databinding+MVP+Retrofit+Rxjava2
Stars: ✭ 2,740 (+2640%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+17%)
FluxionFluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+3175%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (+69%)
Fe2O3Simple prepender virus written in Rust
Stars: ✭ 84 (-16%)
fastaop🚀 lightweight, high-performance AOP framework based on Java Annotation Processing, similar to Lombok
Stars: ✭ 87 (-13%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (-30%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (+933%)
yara-exporterExporting MISP event attributes to yara rules usable with Thor apt scanner
Stars: ✭ 22 (-78%)
repogenEasy-to-use signed APT repository generator with a web-based package browser.
Stars: ✭ 34 (-66%)