MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+33.33%)
Emp3r0rlinux post-exploitation framework made by linux user
Stars: ✭ 419 (+258.12%)
UmbraA LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Stars: ✭ 98 (-16.24%)
SpacecowWindows Rootkit written in Python
Stars: ✭ 81 (-30.77%)
rkorovald_preload userland rootkit
Stars: ✭ 34 (-70.94%)
FatherLD_PRELOAD rootkit
Stars: ✭ 59 (-49.57%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+519.66%)
RtlcssFramework for transforming Cascading Style Sheets (CSS) from Left-To-Right (LTR) to Right-To-Left (RTL)
Stars: ✭ 1,363 (+1064.96%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+970.94%)
MalwarepersistencescriptsA collection of scripts I've written to help red and blue teams with malware persistence techniques.
Stars: ✭ 103 (-11.97%)
Php Malware AnalysisDeobfuscation and analysis of PHP malware captured by a WordPress honey pot
Stars: ✭ 82 (-29.91%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-7.69%)
Artifacts KitPseudo-malicious usermode memory artifact generator kit designed to easily mimic the footprints left by real malware on an infected Windows OS.
Stars: ✭ 99 (-15.38%)
GitcacheWhen clone from github.com, build mirror cache to improve clone speed
Stars: ✭ 77 (-34.19%)
Docker MirrorMirror docker images across image repositories
Stars: ✭ 72 (-38.46%)
BlockLet's make an annoyance free, better open internet, altogether!
Stars: ✭ 1,849 (+1480.34%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-17.95%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-41.03%)
HjmirrorMirroring you droid device screen to Windows, MacOS and Linux.
Stars: ✭ 67 (-42.74%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (-21.37%)
Git MirrorA small utility that allows to mirror external repositories to GitLab, GitHub and possible more.
Stars: ✭ 66 (-43.59%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (-28.21%)
Mclonemclone - 麻麻再也不用担心拉取GitHub代码慢了
Stars: ✭ 104 (-11.11%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-29.06%)
Lime Minera simple hidden silent XMR miner.
Stars: ✭ 109 (-6.84%)
Teleshadow3Telegram Desktop Session Stealer
Stars: ✭ 83 (-29.06%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1440.17%)
EvilclippyA cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
Stars: ✭ 1,224 (+946.15%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (-15.38%)
Awesome CybersecurityCurated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (-34.19%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+8731.62%)
IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (-17.95%)
UrsadbTrigram database written in C++, suited for malware indexing
Stars: ✭ 72 (-38.46%)
FlashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (-1.71%)
AptutilGo utilities for Debian APT repositories
Stars: ✭ 95 (-18.8%)
MirrorA simple and powerful React framework with minimal API and zero boilerplate.
Stars: ✭ 1,445 (+1135.04%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+867.52%)
Malware scriptsVarious scripts for different malware families
Stars: ✭ 91 (-22.22%)
Green Hat SuiteGreen-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Stars: ✭ 112 (-4.27%)
Aircast Iosaircast iOS SDK --- airplay screen mirror receiver iOS8-iOS11.3 support
Stars: ✭ 64 (-45.3%)
RelocbonusAn obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.
Stars: ✭ 106 (-9.4%)
InjectallthethingsSeven different DLL injection techniques in one single project.
Stars: ✭ 1,297 (+1008.55%)
Shadow Box For ArmShadow-Box: Lightweight and Practical Kernel Protector for ARM (Presented at BlackHat Asia 2018)
Stars: ✭ 64 (-45.3%)
Google ratA Remote Access Tool using Google Apps Script as the proxy for command and control.
Stars: ✭ 64 (-45.3%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (-23.93%)
DataAPTnotes data
Stars: ✭ 1,126 (+862.39%)
Robust Adv Malware DetectionCode repository for the paper "Adversarial Deep Learning for Robust Detection of Binary Encoded Malware"
Stars: ✭ 63 (-46.15%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-10.26%)
MalwoverviewMalwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox and it is able to scan Android devices against VT and HA.
Stars: ✭ 1,276 (+990.6%)