sarlaccSMTP server / sinkhole for collecting spam
Stars: ✭ 42 (-85.05%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (-74.73%)
Hosts BlocklistsAutomatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Stars: ✭ 1,749 (+522.42%)
HerculesHERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (+87.19%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (-45.55%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+393.24%)
ThreadBoatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 162 (-42.35%)
UitkykRuntime memory analysis framework to identify Android malware
Stars: ✭ 133 (-52.67%)
kiteshieldPacker/Protector for x86-64 ELF binaries on Linux
Stars: ✭ 71 (-74.73%)
Www.rootkit.comwww.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.
Stars: ✭ 117 (-58.36%)
clamdGolang clamd (clamav daemon) client library
Stars: ✭ 23 (-91.81%)
FlashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (-59.07%)
MxtractmXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+77.58%)
cerberus researchResearch tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (-60.85%)
PracticalmalwarelabsKeep track of the labs from the book "Practical Malware Analysis"
Stars: ✭ 130 (-53.74%)
QuiescisQuescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (-80.07%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+158.01%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+541.28%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (-22.42%)
VolatilityAn advanced memory forensics framework
Stars: ✭ 5,042 (+1694.31%)
ManalyzeA static analyzer for PE executables.
Stars: ✭ 701 (+149.47%)
Box JsA tool for studying JavaScript malware.
Stars: ✭ 444 (+58.01%)
qrxferTransfer files from Air gapped machines using QR codes
Stars: ✭ 88 (-68.68%)
MorphhtamorphHTA - Morphing Cobalt Strike's evil.HTA
Stars: ✭ 438 (+55.87%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (-79%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (-69.4%)
SerpentineC++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (-23.13%)
Malconfscan With CuckooCuckoo Sandbox plugin for extracts configuration data of known malware
Stars: ✭ 110 (-60.85%)
FireelffireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+54.8%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-83.99%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+3980.43%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+8.54%)
ElfparserCross Platform ELF analysis
Stars: ✭ 228 (-18.86%)
Gobot2Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+53.38%)
Lime Minera simple hidden silent XMR miner.
Stars: ✭ 109 (-61.21%)
DemosDemos of various injection techniques found in malware
Stars: ✭ 582 (+107.12%)
BotnetsThis is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY
Stars: ✭ 2,523 (+797.86%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+49.11%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+3577.22%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+1428.83%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (-86.83%)
Gscript framework to rapidly implement custom droppers for all three major operating systems
Stars: ✭ 547 (+94.66%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+36.65%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-85.05%)
Open MyrtusRCEed version of computer malware / rootkit MyRTUs / Stuxnet.
Stars: ✭ 208 (-25.98%)
RelocbonusAn obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.
Stars: ✭ 106 (-62.28%)
BineeBinee: binary emulation environment
Stars: ✭ 408 (+45.2%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-62.63%)
Telegram RatWindows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (-28.47%)
MalwarepersistencescriptsA collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-63.35%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (-64.77%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-50.18%)
MemtriageAllows you to quickly query a Windows machine for RAM artifacts
Stars: ✭ 200 (-28.83%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (-64.77%)
ViriiCollection of ancient computer virus source codes
Stars: ✭ 378 (+34.52%)
Aa ToolsArtifact analysis tools by JPCERT/CC Analysis Center
Stars: ✭ 361 (+28.47%)