Wireguard-DNScrypt-VPN-ServerFast setup wireguard server script, with dnscrypt and adblocking, maleware blocking, more blocking if you need. Use case eg. always on vpn and adblocking on ios or android, and be more secured in unknown networks.
Stars: ✭ 48 (+92%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (+88%)
miraiThe Mirai malware modified for use on NCL/a virtual/simulated environment.
Stars: ✭ 32 (+28%)
kiteshieldPacker/Protector for x86-64 ELF binaries on Linux
Stars: ✭ 71 (+184%)
mkpolyA simple polymorphic engine
Stars: ✭ 28 (+12%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+1120%)
sarlaccSMTP server / sinkhole for collecting spam
Stars: ✭ 42 (+68%)
UmbraA LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Stars: ✭ 98 (+292%)
VX-APICollection of various malicious functionality to aid in malware development
Stars: ✭ 904 (+3516%)
unbox🎁 unbox - Unpack and Decompile the $h*! out of things
Stars: ✭ 39 (+56%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (+336%)
Malware-CollectionSource codes of malwares, stress tests etc. for computer.
Stars: ✭ 27 (+8%)
showstopperShowStopper is a tool for helping malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash with standard anti-debug methods.
Stars: ✭ 132 (+428%)
unprotectUnprotect is a python tool for parsing PE malware and extract evasion techniques.
Stars: ✭ 75 (+200%)
DGA-DetectionDGA Domain Detection using Bigram Frequency Analysis
Stars: ✭ 47 (+88%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+1024%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+1088%)
TML.PatcherConsole application for decompiling, recompiling, packaging, and patching tModLoader's .tmod files at blazing-fast speeds.
Stars: ✭ 38 (+52%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (+368%)
source-map-unpackUnpack 🛍 your JS source maps 🗺 to original files and folders.
Stars: ✭ 115 (+360%)
rhinoAgile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (+96%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (+512%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+980%)
PboViewerCross-platform PBO maker / unpacker
Stars: ✭ 28 (+12%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (+56%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+276%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-28%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (+4%)
binary-auditing-solutionsLearn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.
Stars: ✭ 61 (+144%)
npk-toolsMikrotik's NPK files managing tools
Stars: ✭ 63 (+152%)
OrcaAdvanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions ! (uncompleted)
Stars: ✭ 184 (+636%)
binlexA Binary Genetic Traits Lexer Framework
Stars: ✭ 303 (+1112%)
malware api classMalware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API calls analysis for cyber security researchers
Stars: ✭ 134 (+436%)
yaraMalice Yara Plugin
Stars: ✭ 27 (+8%)
DFIR Resources REvil KaseyaResources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+588%)
qt-ratRemote administration tool with Qt5
Stars: ✭ 37 (+48%)
IAT APIAssembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Stars: ✭ 63 (+152%)
dga-collectionA collection of known Domain Generation Algorithms
Stars: ✭ 61 (+144%)
RoAMerRobust Automated Malware Unpacker
Stars: ✭ 72 (+188%)
monetaMoneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Stars: ✭ 384 (+1436%)
Kernel-dll-injectorKernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (+924%)
trolotrolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (+80%)
FIDLA sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Stars: ✭ 421 (+1584%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2604%)
Runpe In MemoryRun a Exe File (PE Module) in memory (like an Application Loader)
Stars: ✭ 249 (+896%)
JustEvadeBroJustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
Stars: ✭ 63 (+152%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (+176%)
dmc unrarA dependency-free, single-file FLOSS unrar library
Stars: ✭ 47 (+88%)
agsutilscontains utils for AGS: game extractor, repacker, disassembler and assembler
Stars: ✭ 30 (+20%)
CEHExam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+184%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (+908%)