IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-27.82%)
MalwoverviewMalwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox and it is able to scan Android devices against VT and HA.
Stars: ✭ 1,276 (+859.4%)
Malconfscan With CuckooCuckoo Sandbox plugin for extracts configuration data of known malware
Stars: ✭ 110 (-17.29%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (-25.56%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-38.35%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1254.89%)
Malware scriptsVarious scripts for different malware families
Stars: ✭ 91 (-31.58%)
MbaMalware Behavior Analyzer
Stars: ✭ 125 (-6.02%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+842.11%)
HawktracerHawkTracer is a highly portable, low-overhead, configurable profiling tool built in Amazon Video for getting performance metrics from low-end devices.
Stars: ✭ 108 (-18.8%)
MalwarepersistencescriptsA collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-22.56%)
Awesome CybersecurityCurated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-42.11%)
Www.rootkit.comwww.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.
Stars: ✭ 117 (-12.03%)
ArtistARTist's core implementation meant to be included in the art project. Provides ARTist APIs and boilerplate code for modules.
Stars: ✭ 97 (-27.07%)
DeathransomA ransomware developed in python, with bypass technics, for educational purposes.
Stars: ✭ 126 (-5.26%)
Capture ThreadLock-free framework for loggers, tracers, and mockers in multithreaded C++ programs.
Stars: ✭ 93 (-30.08%)
Client javaPrometheus instrumentation library for JVM applications
Stars: ✭ 1,644 (+1136.09%)
InjectallthethingsSeven different DLL injection techniques in one single project.
Stars: ✭ 1,297 (+875.19%)
AdamCoroutine-friendly Android Debug Bridge client written in Kotlin
Stars: ✭ 129 (-3.01%)
1hostsDNS filter-/blocklists | safe. private. clean. browsing!
Stars: ✭ 85 (-36.09%)
SpacecowWindows Rootkit written in Python
Stars: ✭ 81 (-39.1%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+7669.17%)
KappuccinoA kotlin library to simplify how to do espresso tests on Android.
Stars: ✭ 104 (-21.8%)
Hosts BlocklistsAutomatically updated, moderated and optimized lists for blocking ads, trackers, malware and other garbage
Stars: ✭ 1,749 (+1215.04%)
Telemetry pollerPeriodically gather measurements and publish them as Telemetry events
Stars: ✭ 101 (-24.06%)
Mass RatBasic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-4.51%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (-25.56%)
FlashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (-13.53%)
FluxterFast and reliable InfluxDB writer for Elixir
Stars: ✭ 96 (-27.82%)
Ergo Pe Av🧠 🦠 An artificial neural network and API to detect Windows malware, based on Ergo and LIEF.
Stars: ✭ 130 (-2.26%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-27.82%)
BlockLet's make an annoyance free, better open internet, altogether!
Stars: ✭ 1,849 (+1290.23%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (-30.83%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+8521.05%)
JplusoneTool for automatic detection and asserting "N+1 SELECT problem" occurences in JPA based Spring Boot Java applications and finding origin of JPA issued SQL statements in general
Stars: ✭ 91 (-31.58%)
Green Hat SuiteGreen-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Stars: ✭ 112 (-15.79%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-33.08%)
ThreadboatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 132 (-0.75%)
Coinhive BlockTo block the malware domains of coin-hive systemwide.
Stars: ✭ 85 (-36.09%)
Opentracing AutoOut of the box distributed tracing for Node.js applications with OpenTracing.
Stars: ✭ 110 (-17.29%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-36.84%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-6.02%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-37.59%)
Lime Minera simple hidden silent XMR miner.
Stars: ✭ 109 (-18.05%)
Teleshadow3Telegram Desktop Session Stealer
Stars: ✭ 83 (-37.59%)
OrbitC/C++ Performance Profiler
Stars: ✭ 2,291 (+1622.56%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-18.8%)
EvilclippyA cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
Stars: ✭ 1,224 (+820.3%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-9.02%)
RelocbonusAn obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.
Stars: ✭ 106 (-20.3%)
DynamorioDynamic Instrumentation Tool Platform
Stars: ✭ 1,828 (+1274.44%)
PracticalmalwarelabsKeep track of the labs from the book "Practical Malware Analysis"
Stars: ✭ 130 (-2.26%)
Go Http MetricsGo modular http middleware to measure HTTP requests independent of metrics backend (with Prometheus and OpenCensus as backend implementations) and http framework/library
Stars: ✭ 128 (-3.76%)
AflplusplusThe fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Stars: ✭ 2,319 (+1643.61%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-21.05%)