Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c malware
c
x
malware
x
117 search results found
Reverse Engineering
⭐
9,941
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Pafish
⭐
1,989
Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that malware families do
Diamorphine
⭐
1,639
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Passivedns
⭐
1,542
A network sniffer that logs all DNS server replies for use in a passive DNS setup
Process Dump
⭐
1,442
Windows tool for dumping malware PE files from memory back to disk for analysis.
Zeus
⭐
1,235
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
Apache Ultimate Bad Bot Blocker
⭐
718
Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
Demos
⭐
695
Demos of various injection techniques found in malware
Dumpulator
⭐
627
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
Mal_unpack
⭐
572
Dynamic unpacker based on PE-sieve
Tl Bots
⭐
418
A collection of source code for various botnets.
Process_doppelganging
⭐
383
My implementation of enSilo's Process Doppelganging (PE injection technique)
Awesome Csirt
⭐
368
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Transacted_hollowing
⭐
334
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Richkware
⭐
313
Framework for building Windows malware, written in C++
Cuteviruscollection
⭐
292
A Collection of Cute But Deadly Viruses
Malheur
⭐
291
A Tool for Automatic Analysis of Malware Behavior
Processhacker
⭐
283
A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware—mirror of https://github.com/processhacker2/processhacker.gi
Gonnacry
⭐
267
A Linux Ransomware
Zer0m0n
⭐
246
zer0m0n driver for cuckoo sandbox
Bitcoin Hacking Tools
⭐
209
The source code of main tools used in Bitcoin "non-malware-based" attacks.
Smmbackdoorng
⭐
193
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Ecfs
⭐
166
extended core file snapshot format
Iot Malware
⭐
147
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
Sheep Wolf
⭐
144
Wolves Among the Sheep
Malwareapilibrary
⭐
137
collection of apis used in malware development
Usbvalve
⭐
126
Expose USB activity on the fly
Mba
⭐
125
Malware Behavior Analyzer
Amatutor
⭐
123
Android Malware Analysis Tutorial | Android恶意代码分析教程
Cockygrabber
⭐
108
C# library for the collection of browser information such as cookies, logins, bookmarks and more
Stuxnet Source
⭐
108
stuxnet Source & Binaries. ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
Nowatch
⭐
102
Implant drop-in for EDR testing
Shaco
⭐
94
Shaco is a linux agent for havoc
Maldrolyzer
⭐
87
Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)
Meow
⭐
86
Cybersecurity research results. Simple C/C++ and Python implementations
Malware Analysis Detection Engineering
⭐
85
Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha
Coinhive Block
⭐
84
To block the malware domains of coin-hive systemwide.
Father
⭐
79
LD_PRELOAD rootkit
Reflectiventdll
⭐
74
A Dropper POC focusing EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (using pe2shc by @hasherezade). Payload encryption via SystemFucntion033 NtApi and No new thread via Fiber
Beeswax
⭐
69
A Next Generation Honeypot for a 2016 Oregon State Senior Project
Osx_boubou
⭐
62
A PoC Mach-O infector via library injection
Fuck Etw
⭐
60
Bypass the Event Trace Windows(ETW) and unhook ntdll.
Ghost Usb Honeypot
⭐
60
A honeypot for malware that propagates via USB storage devices
Locky
⭐
60
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Void Zones Tools
⭐
55
Prepare a list of void zones that can be readily feed into Unbound on FreeBSD
Ffbf
⭐
49
Feed-forward Bloom filters
Matire
⭐
47
Malware Analysis, Threat Intelligence and Reverse Engineering: LABS
Frosty
⭐
44
「🧊」Ring 3 Rootkit for Windows 10
Temu
⭐
43
TEMU: The BitBlaze Dynamic Analysis Component (with some patches).
Kiteshield
⭐
41
Packer/Protector for x86-64 ELF binaries on Linux
Hacklu
⭐
39
Mass Malicious Script Dump
⭐
38
Mass malicious script dump/Malware src dump
Medusa
⭐
37
LD_PRELOAD Rootkit
Vault 8 Hive
⭐
35
Hive solves a critical problem for the malware operators at the CIA.
Umbra
⭐
31
A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Coqui
⭐
29
Bare Bones Banking malware coded for research & educational purposes
Injection For Dummies
⭐
28
A collection of PoCs for different injection techniques on Windows!
Dllloaderunpacker
⭐
27
Noteme
⭐
26
ELF packer/crypter that aims to create hardened and stealthy troyans
Rex_versus_the_romans
⭐
25
Anti Hacking Team TrustedBSD module
Ieee_taggant_system
⭐
25
Taggant System developed by the Malware Working Group of ICSG (Industry Connections Security Group) under the umbrella of IEEE
Driver Collider
⭐
24
Blocks drivers from loading by using a name collision technique. #nsacyber
Runsc
⭐
24
runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is based on the code from https://github.com/Kdr0x/Kd_Shellcode_Loader by Gary "kd" Contreras.
Vaccination
⭐
24
Grey_fox
⭐
23
The grey fox
Quiescis
⭐
23
Quescis is a powerful Remote Access Trojan for windows 💻 on C++
Fanny.bmp
⭐
23
fanny.bmp Source & Binaries. ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! FANNY BMP MALWARE SOURCE + BINARY + Metasploit Module Checker
Cloud_integrity
⭐
22
Using LibVMI to detect malware
Kubedagger
⭐
22
Kubernetes offensive framework built in eBPF
C_icap_yara
⭐
21
C-ICAP Yara module
Emotet_protection_tools
⭐
21
This repository provides tools to fight against Emotet malware. You can protect your system using these tools
Rto Implant
⭐
20
Red Team Operator: Malware Development Essentials Course
Winnti Detector
⭐
19
Network detector for Winnti malware
Stealthware Backdoor
⭐
18
Persistent & Undetectable Malware Backdoor
Elf Virus
⭐
17
A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.
Joecrypter
⭐
16
Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.
Mbroverwrite
⭐
16
「💽」MBR Overwrite malware for linux
Remote_malware_analyzer
⭐
16
Sandbox d'analyse de malware pour Windows 7 avec un client TCP en mode noyau
Mirai
⭐
16
The Mirai malware modified for use on NCL/a virtual/simulated environment.
Emofishes
⭐
15
Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the ones setup for malware analysis).
Ntfs Journal Viewer
⭐
14
Utterly simple NTFS Journal dumping utility. Handy when it comes to Computer Forensics and Malware Forensics Ops.
Malware With Backdoor And Keylogger
⭐
14
👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
Exec_lkm
⭐
14
A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on how to compile) reverse shell provided in C.
Raisin
⭐
13
Reverse shell and rootkit
1337kit
⭐
12
64-bit LKM Rootkit builder based on yaml prescription. Working on 5.15.5 kernel
Elam
⭐
12
A Practical example of ELAM (Early Launch Anti-Malware)
Openvaccine
⭐
11
protect USB devices FAT-32 partitions against malware
Trojan
⭐
10
Umse
⭐
10
Universal Malware Sample Encryption
Capstone
⭐
9
Mirror of git://qemu.org/capstone.git
Librk
⭐
9
lib-RootKit is a library meant to make creating "advanced malware" easier.
Adr
⭐
9
ADR is a trojan that retrieves all information on the computer and all data stored in applications using chormuim. It recovers cookies, tokens, passwords and saved bank cards. This malware is undetectable by Windows Defender, Chrome, Virustotal (4/71).
Ethical Hacking
⭐
9
Codes for malware, viruses and key-logger and other tools
Whitebox
⭐
9
A Whitebox 2008 Proto-type for malware detection
Xorcrypt
⭐
8
☣️ shellcode xor (en|de)crypter
Itssoeasy
⭐
8
A Linux/Windows Ransomware PoC written in Python, Go and C
Absinthe
⭐
7
MBR virus
Intel
⭐
7
public malware intelligence
Related Searches
C Kernel (12,951)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C C Plus Plus (2,996)
C Arm (2,656)
C Usb (2,589)
C Command Line (2,475)
1-100 of 117 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.