Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for malware
malware
x
1,855 search results found
Simpleator
⭐
324
Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Msfmania
⭐
321
Python AV Evasion Tools
Malware Research
⭐
318
Code written as part of our various malware investigations
Infectpe
⭐
313
InfectPE - Inject custom code into PE file [This project is not maintained anymore]
Richkware
⭐
313
Framework for building Windows malware, written in C++
Docker Mailserver
⭐
309
Docker Mailserver based on the famous ISPMail guide
Ir Rescue
⭐
309
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Blackweb
⭐
306
Domains Blocklist for Squid-Cache
Pepper
⭐
302
An open source script to perform malware static analysis on Portable Executable
Owlyshield
⭐
301
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).
Discord Phishing Links
⭐
300
An actively maintained JSON & txt List containing 22'000+ malicious Domains which are used for phishing on Discord.
Telnet Iot Honeypot
⭐
299
Python telnet honeypot for catching botnet binaries
Pyew
⭐
297
Official repository for Pyew.
Limon
⭐
295
Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect Linux malware before execution, during execution, and after execution (post-mortem analysis) by performing static, dynamic and memory analysis using open source tools
Ph0neutria
⭐
295
ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and manageability.
Mbc Markdown
⭐
293
MBC content in markdown
Invoker
⭐
292
Penetration testing utility and antivirus assessment tool.
Cuteviruscollection
⭐
292
A Collection of Cute But Deadly Viruses
Malheur
⭐
291
A Tool for Automatic Analysis of Malware Behavior
Little Snitch Rule Groups
⭐
289
This repo provide rule groups for Little Snitch based on unified host list to block ads, malware, fake news and porn
Zeek Intelligence Feeds
⭐
287
Zeek-Formatted Threat Intelligence Feeds
Polichombr
⭐
287
Collaborative malware analysis framework
Updated Carbanak Source With Plugins
⭐
287
https://twitter.com/itsreallynick/status/112041095
Mwdb Core
⭐
286
Malware repository component for samples & static configuration with REST API interface.
Malduck
⭐
286
🦆 Malduck is your ducky companion in malware analysis journeys
Processhacker
⭐
283
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware—mirror of https://github.com/processhacker2/processhacker.gi
Tl Trojan
⭐
282
A collection of source code for various RATs, Stealers, and other Trojans.
Daily Info
⭐
280
Evasions
⭐
278
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
Unified Hosts Autoupdate
⭐
276
Quickly and easily install, uninstall, and set up automatic updates for any of Steven Black's unified hosts files.
Kicomav
⭐
274
KicomAV is an open source (GPL v2) antivirus engine designed for detecting malware and disinfecting it.
Nt_wrapper
⭐
272
A wrapper library around native windows sytem APIs
Filewatcher
⭐
270
A simple auditing utility for macOS
Cryptsky
⭐
269
A simple, fully python ransomware PoC
Peacemaker
⭐
268
PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.
Gonnacry
⭐
267
A Linux Ransomware
Maldev
⭐
267
⚠️ malware development
Threat Intelligence Analyst
⭐
263
威胁情报,恶意样本分析,开源Malware代码收集
Rust U2f
⭐
261
U2F security token emulator written in Rust
Mcantimalware
⭐
261
Anti-Malware for minecraft
Godgenesis
⭐
260
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
Relocbonus
⭐
257
An obfuscation tool for Windows which instruments the Windows Loader into acting as an unpacking engine.
Falcongate
⭐
255
A smart gateway to stop cyber criminals - Sponsored by Falcon Guard
Egesploit
⭐
255
EGESPLOIT is a golang library for malware development
Goat
⭐
254
🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Elfparser
⭐
254
Cross Platform ELF analysis
Ddos
⭐
254
All about DDoS attacks, exploits, botnets and some proxies =)
Zip
⭐
254
Robust ZIP decoder with defenses against dangerous compression ratios, spec deviations, malicious archive signatures, mismatching local and central directory headers, ambiguous UTF-8 filenames, directory and symlink traversals, invalid MS-DOS dates, overlapping headers, overflow, underflow, sparseness, accidental buffer bleeds etc.
Pockint
⭐
251
A portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Yaragenerator
⭐
248
Automatic Yara Rule Generation
Zer0m0n
⭐
246
zer0m0n driver for cuckoo sandbox
Docker Cuckoo
⭐
246
Cuckoo Sandbox Dockerfile
Drltrace
⭐
245
Drltrace is a library calls tracer for Windows and Linux applications.
Bxaq
⭐
245
Php7 Opcache Override
⭐
244
Security-related PHP7 OPcache abuse tools and demo
Malwaredatabase
⭐
243
Processspawncontrol
⭐
242
Process Spawn Control is a Powershell tool which aims to help in the behavioral (process) analysis of malware. PsC suspends newly launched processes, and gives the analyst the option to either keep the process suspended, or to resume it.
Pe
⭐
240
A ⚡ lightweight Go package to parse, analyze and extract metadata from Portable Executable (PE) binaries. Designed for malware analysis tasks and robust against PE malformations.
Paragon
⭐
240
Red Team engagement platform with the goal of unifying offensive tools behind a simple UI
Stuxnet
⭐
239
Public open-source code of malware Stuxnet (aka MyRTUs).
Misp Taxonomies
⭐
238
Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Osripper
⭐
238
AV evading OSX Backdoor and Crypter Framework
Maldev
⭐
235
Golang library for malware development
Lisa
⭐
233
Sandbox for automated Linux malware analysis.
Docker
⭐
232
This repository contains Dockerfiles for building Docker images of popular malware analysis tools, which are distributed through the REMnux repository on Docker Hub.
Android Malware Sandbox
⭐
231
Android Malware Sandbox
Community
⭐
228
Volatility plugins developed and maintained by the community
Misp Book
⭐
227
User guide of MISP
Cosa Nostra
⭐
226
Cosa Nostra, a FOSS graph based malware clusterization toolkit.
Malware Database
⭐
226
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
Memhunter
⭐
225
Live hunting of code injection techniques
Blocklists
⭐
225
DNS Block Lists
Trawler
⭐
224
PowerShell script to help Incident Responders discover potential adversary persistence mechanisms.
Wifi Password Stealer
⭐
223
Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).
Analyzer
⭐
222
Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)
Jpgtomalware
⭐
220
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganograp
Aptmalware
⭐
220
APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples
Trisis Triton Hatman
⭐
220
Repository containting original and decompiled files of TRISIS/TRITON/HATMAN malware
Open Myrtus
⭐
219
RCEed version of computer malware / rootkit MyRTUs / Stuxnet.
Drsemu
⭐
218
DrSemu - Malware Detection and Classification Tool Based on Dynamic Behavior [This project is not maintained anymore]
Pyaescrypt
⭐
217
A Python 3 module and script that uses AES256-CBC to encrypt/decrypt files and streams in AES Crypt file format (version 2).
Dotdumper
⭐
215
An automatic unpacker and logger for DotNet Framework targeting files
Anti Debugging
⭐
209
A collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Bitcoin Hacking Tools
⭐
209
The source code of main tools used in Bitcoin "non-malware-based" attacks.
Persistence_demos
⭐
208
Demos of various (also non standard) persistence methods used by malware
Energizedprotection
⭐
207
A merged collection of hosts from reputable sources. #StayEnergized!
Millenium Rat
⭐
203
🔶Fully telegram-controlled windows RAT, no dedicated server for needed for usage. All the features are listed in the README file
Vxsig
⭐
203
Automatically generate AV byte signatures from sets of similar binaries.
Apt38 0day Stealer
⭐
201
APT38 Tactic PoC for Stealing 0days
Resource List
⭐
199
GitHub Project Resource List
Pafishmacro
⭐
197
Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques implemented by malicious documents.
Avpass
⭐
195
Tool for leaking and bypassing Android malware detection system
Combinedprivacyblocklists
⭐
195
Ad-blocking hosts files, IP block lists, PAC filters, ABP / uBO subscriptions and a whole lot more, all merged from multiple reputable sources, combined with my own research. Also, script-based utilities to help you create such things yourself. Updated at least once every two weeks, often more frequently.
Smmbackdoorng
⭐
193
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
Moneta
⭐
193
Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs
Justevadebro
⭐
193
JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
Meterpwrshell
⭐
192
Automated Tool That Generates The Perfect Meterpreter Powershell Payload
Stink
⭐
192
🚀 Stealer on built-in libraries only, which doesn't create any temp files on data collecting, with 4 sending methods and lots of functionality.
Avpwn
⭐
191
List of real-world threats against endpoint protection software
Dorothy2
⭐
190
A malware/botnet analysis framework written in Ruby.
Related Searches
Python Malware (925)
Security Malware (277)
201-300 of 1,855 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.