Vxug PapersResearch code & papers from members of vx-underground.
Stars: ✭ 291 (+15.48%)
Nginx Ultimate Bad Bot BlockerNginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
Stars: ✭ 2,351 (+832.94%)
4K-BotnetA simple and easy to use JS Botnet
Stars: ✭ 73 (-71.03%)
ConpotICS/SCADA honeypot
Stars: ✭ 853 (+238.49%)
anti-honeypot一款可以检测WEB蜜罐并阻断请求的Chrome插件,能够识别并阻断长亭D-sensor、墨安幻阵的部分溯源api
Stars: ✭ 38 (-84.92%)
Malconfscan With CuckooCuckoo Sandbox plugin for extracts configuration data of known malware
Stars: ✭ 110 (-56.35%)
techmapHoneypot's Tech Map
Stars: ✭ 43 (-82.94%)
SpacesirenA honey token manager and alert system for AWS.
Stars: ✭ 247 (-1.98%)
Ergo Pe Av🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.
Stars: ✭ 130 (-48.41%)
MedusaBinary instrumentation framework based on FRIDA
Stars: ✭ 258 (+2.38%)
mozitoolsMozi Botnet related tools helping to unpack a sample, decode a configuration and track active Mozi nodes using DHT.
Stars: ✭ 23 (-90.87%)
LOLBAS222APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (-60.32%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-57.14%)
Fe2O3Simple prepender virus written in Rust
Stars: ✭ 84 (-66.67%)
YargenyarGen is a generator for YARA rules
Stars: ✭ 795 (+215.48%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-36.11%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+187.7%)
VindicateToolLLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-84.13%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+4000.4%)
HomebrewOverlayBrowser extension adware (showHomebrewOverlayOuter)
Stars: ✭ 52 (-79.37%)
HblockImprove your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+187.3%)
CleanUnwantedUpdatesA set of scripts to detect updates of Microsoft (TM) Windows (TM) OS which harm users' privacy and uninstall them
Stars: ✭ 24 (-90.48%)
Javascript-Botnet-C-SharpThis is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets
Stars: ✭ 22 (-91.27%)
Lime RatLimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+163.1%)
seahorseELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Stars: ✭ 31 (-87.7%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-58.33%)
SpywarePython-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (-87.7%)
Cyberchef RecipesA list of cyber-chef recipes and curated links
Stars: ✭ 619 (+145.63%)
Anti-Debug-DBAnti-Debug encyclopedia contains methods used by malware to verify if they are executed under debugging. It includes the description of various anti-debug tricks, their implementation, and recommendations of how to mitigate the each trick.
Stars: ✭ 20 (-92.06%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-36.51%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-70.24%)
mobileAuditDjango application that performs SAST and Malware Analysis for Android APKs
Stars: ✭ 140 (-44.44%)
SpybrowseCode developed to steal certain browser config files (history, preferences, etc)
Stars: ✭ 57 (-77.38%)
Adamantium Thief🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (+12.3%)
Bold-Falcon毕方智能云沙箱(Bold-Falcon)是一个开源的自动化恶意软件分析系统;方班网络安全综合实验-设计类;
Stars: ✭ 30 (-88.1%)
RouterosRouterOS Security Research Tooling and Proof of Concepts
Stars: ✭ 603 (+139.29%)
KicomavKicomAV is an open source (GPL v2) antivirus engine designed for detecting malware and disinfecting it.
Stars: ✭ 227 (-9.92%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (-57.14%)
DemosDemos of various injection techniques found in malware
Stars: ✭ 582 (+130.95%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (-60.71%)
Nt wrapperA wrapper library around native windows sytem APIs
Stars: ✭ 287 (+13.89%)
MsfManiaPython AV Evasion Tools
Stars: ✭ 388 (+53.97%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+2258.73%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (-60.71%)
Malware SamplesA collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
Stars: ✭ 565 (+124.21%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (+0%)
Pepper An open source script to perform malware static analysis on Portable Executable
Stars: ✭ 250 (-0.79%)
FilewatcherA simple auditing utility for macOS
Stars: ✭ 233 (-7.54%)
Trisis Triton HatmanRepository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
Stars: ✭ 178 (-29.37%)
BluehivePowerShell based Active Directory Honey User Account Management with Universal Dashboards
Stars: ✭ 126 (-50%)
SentelloSentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.
Stars: ✭ 54 (-78.57%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (+13.1%)