MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+110.87%)
ThreadBoatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 162 (-11.96%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-54.35%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+6131.52%)
IDVerification"Very simple but works well" Computer Vision based ID verification solution provided by LibraX.
Stars: ✭ 44 (-76.09%)
KicomavKicomAV is an open source (GPL v2) antivirus engine designed for detecting malware and disinfecting it.
Stars: ✭ 227 (+23.37%)
SerpentineC++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+17.39%)
MemtriageAllows you to quickly query a Windows machine for RAM artifacts
Stars: ✭ 200 (+8.7%)
VX-APICollection of various malicious functionality to aid in malware development
Stars: ✭ 904 (+391.3%)
DRIPFixed Income Analytics, Portfolio Construction Analytics, Transaction Cost Analytics, Counter Party Analytics, Asset Backed Analytics
Stars: ✭ 44 (-76.09%)
Unified Hosts AutoupdateQuickly and easily install, uninstall, and set up automatic updates for any of Steven Black's unified hosts files.
Stars: ✭ 185 (+0.54%)
FilewatcherA simple auditing utility for macOS
Stars: ✭ 233 (+26.63%)
RiskInDroidA tool for quantitative risk analysis of Android applications based on machine learning techniques
Stars: ✭ 69 (-62.5%)
Threat HuntingPersonal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (+19.02%)
Open MyrtusRCEed version of computer malware / rootkit MyRTUs / Stuxnet.
Stars: ✭ 208 (+13.04%)
flowriskA Python Implementation of Measures for Order Flow Risk, e.g. VPIN
Stars: ✭ 53 (-71.2%)
QilingQiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+1430.43%)
miraiThe Mirai malware modified for use on NCL/a virtual/simulated environment.
Stars: ✭ 32 (-82.61%)
TriFlowTriFlow: Triaging Android Applications using Speculative Information Flows
Stars: ✭ 12 (-93.48%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (-3.26%)
LisaSandbox for automated Linux malware analysis.
Stars: ✭ 177 (-3.8%)
AnteaterAnteater - CI/CD Gate Check Framework
Stars: ✭ 174 (-5.43%)
rhinoAgile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (-73.37%)
RiskPortfoliosFunctions for the construction of risk-based portfolios
Stars: ✭ 43 (-76.63%)
Misp TaxonomiesTaxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (-8.7%)
Malware SamplesMalware samples, analysis exercises and other interesting resources.
Stars: ✭ 241 (+30.98%)
riskA game of Risk played on a hexgrid.
Stars: ✭ 95 (-48.37%)
ElfparserCross Platform ELF analysis
Stars: ✭ 228 (+23.91%)
UmbraA LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Stars: ✭ 98 (-46.74%)
collector⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews
Stars: ✭ 26 (-85.87%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (+18.48%)
malware api classMalware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers
Stars: ✭ 134 (-27.17%)
BotnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+1271.2%)
OasisLMFLoss modelling framework.
Stars: ✭ 84 (-54.35%)
Telegram RatWindows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (+9.24%)
Kernel-dll-injectorKernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (+39.13%)
Process doppelgangingMy implementation of enSilo's Process Doppelganging (PE injection technique)
Stars: ✭ 198 (+7.61%)
awesome-risksSample Risks for a Software Project
Stars: ✭ 36 (-80.43%)
BlackwebDomains Blocklist for Squid-Cache
Stars: ✭ 189 (+2.72%)
Php Antimalware ScannerAMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Stars: ✭ 181 (-1.63%)
DLL-INJECTORI created a dll injector I am going to Open source its Code. But remember one thing that is any one can use it only for Educational purpose .I again say do not use it to damage anyone's Computer.But one thing if you are using it for some good purpose like to help someone who really need help then I permit you to use it.
Stars: ✭ 14 (-92.39%)
Trisis Triton HatmanRepository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
Stars: ✭ 178 (-3.26%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (+128.8%)
EnergizedprotectionA merged collection of hosts from reputable sources. #StayEnergized!
Stars: ✭ 175 (-4.89%)
market risk gan tensorflowUsing Bidirectional Generative Adversarial Networks to estimate Value-at-Risk for Market Risk Management using TensorFlow.
Stars: ✭ 63 (-65.76%)
EvasionsEvasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Stars: ✭ 173 (-5.98%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (-6.52%)
Runpe In MemoryRun a Exe File (PE Module) in memory (like an Application Loader)
Stars: ✭ 249 (+35.33%)
Nginx Ultimate Bad Bot BlockerNginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
Stars: ✭ 2,351 (+1177.72%)
DdoorDDoor - cross platform backdoor using dns txt records
Stars: ✭ 168 (-8.7%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-12.5%)
social-dataCode and data for eviction and housing analysis in the US
Stars: ✭ 17 (-90.76%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (-15.22%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (+36.96%)
mkpolyA simple polymorphic engine
Stars: ✭ 28 (-84.78%)