Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for malware
malware
x
1,855 search results found
Apache Ultimate Bad Bot Blocker
⭐
718
Apache Block Bad Bots, (Referer) Spam Referrer Blocker, Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites, Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
Crits
⭐
713
CRITs - Collaborative Research Into Threats
Malware Analysis Training
⭐
709
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
Demos
⭐
695
Demos of various injection techniques found in malware
Malware
⭐
692
Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com
Gobot2
⭐
687
Second Version of The GoBot Botnet, But more advanced.
Osx Security Awesome
⭐
687
A collection of OSX and iOS security resources
Malware Gems
⭐
670
A not so awesome list of malware gems for aspiring malware analysts
Hackgpt
⭐
665
I leverage OpenAI and ChatGPT to do hackerish things
Practicalmalwareanalysis Labs
⭐
664
Binaries for the book Practical Malware Analysis
Magento Malware Scanner
⭐
661
Scanner, signatures and the largest collection of Magento malware
Thephish
⭐
653
ThePhish: an automated phishing email analysis tool
Malware Analysis And Reverse Engineering
⭐
651
Some of my publicly available Malware analysis and Reverse engineering.
Fireelf
⭐
637
fireELF - Fileless Linux Malware Framework
Saferwall
⭐
632
☁️ Collaborative Malware Analysis Platform at Scale
Ghost
⭐
632
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Klara
⭐
630
Kaspersky's GReAT KLara
Dumpulator
⭐
627
An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in general (sandboxing).
Exocet Av Evasion
⭐
624
EXOCET - AV-evading, undetectable, payload delivery tool
Hijackthis
⭐
623
A free utility that finds malware, adware and other security threats
Multiscanner
⭐
609
Modular file scanning/analysis framework
Hercules
⭐
593
HERCULES is a special payload generator that can bypass antivirus softwares.
Domain_generation_algorithms
⭐
591
Some results of my DGA reversing efforts
Trojancockroach
⭐
591
A Stealthy Trojan Spyware
Opensquat
⭐
576
The openSquat project is an open-source solution for detecting phishing domains and domain squatting. It searches for newly registered domains that impersonate legitimate domains on a daily basis.
Mxtract
⭐
573
mXtract - Memory Extractor & Analyzer
Packj
⭐
573
Packj stops ⚡ Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in your software supply-chain
Mal_unpack
⭐
572
Dynamic unpacker based on PE-sieve
Anti Emulator
⭐
569
Android Anti-Emulator
Wiki.secmobi.com
⭐
568
SecMobi Wiki is a collection of mobile security resources.
Habomalhunter
⭐
567
HaboMalHunter is a sub-project of Habo Malware Analysis System (https://habo.qq.com), which can be used for automated malware analysis and security assessment on the Linux system.
Luna Grabber
⭐
566
The best discord token grabber made in python
Adamantium Thief
⭐
563
🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Php Antimalware Scanner
⭐
560
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Smmbackdoor
⭐
547
First open source and publicly available System Management Mode backdoor for UEFI based platforms. Good as general purpose playground for various SMM experiments.
Python Rootkit
⭐
546
Python Remote Administration Tool (RAT) to gain meterpreter session
Box Js
⭐
540
A tool for studying JavaScript malware.
Awesome Iocs
⭐
525
A collection of sources of indicators of compromise.
Gscript
⭐
517
framework to rapidly implement custom droppers for all three major operating systems
Awesome Radare2
⭐
516
A curated list of awesome projects, articles and the other materials powered by Radare2
Morphhta
⭐
514
morphHTA - Morphing Cobalt Strike's evil.HTA
Malware Sample Library
⭐
513
Malware sample library.
Peframe
⭐
495
PEframe is a open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.
Threathunting
⭐
495
Tools for hunting for threats.
Unipacker
⭐
490
Automatic and platform-independent unpacker for Windows binaries based on emulation
Cuckoo Droid
⭐
477
CuckooDroid - Automated Android Malware Analysis with Cuckoo Sandbox.
Php Malware Scanner
⭐
475
Scans PHP files for malwares and known threats
Dex Oracle
⭐
473
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Malconfscan
⭐
462
Volatility plugin for extracts configuration data of known malware
Misp Galaxy
⭐
455
Clusters and elements to attach to MISP events or attributes (like threat actors)
Gym Malware
⭐
448
Aa Tools
⭐
446
Artifact analysis tools by JPCERT/CC Analysis Center
Funcap
⭐
446
IDA Pro script to add some useful runtime info to static analysis
Binee
⭐
440
Binee: binary emulation environment
Cicflowmeter
⭐
439
CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has been used in many Cybersecurity datsets such as Android Adware-General Malware dataset (CICAAGM2017), IPS/IDS dataset (CICIDS2017), Android Malware dataset (CICAndMal2017) and Distributed Denial of Service (CICDDoS2019).
Fidl
⭐
432
A sane API for IDA Pro's decompiler. Useful for malware RE and vulnerability research
Gc2 Sheet
⭐
431
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
Ransomware
⭐
431
A POC Windows crypto-ransomware (Academic)
Safebrowsing
⭐
430
Safe Browsing API Go Client
Lime Crypter
⭐
428
Simple obfuscation tool
Jsdetox
⭐
427
A Javascript malware analysis tool
Urlextractor
⭐
427
Information gathering & website reconnaissance | https://phishstats.info/
Cyber Defence
⭐
422
Information released publicly by NCC Group's Cyber Incident Response Team
Open Source Tools For Cti
⭐
422
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Tl Bots
⭐
418
A collection of source code for various botnets.
Wirelurkerdetector
⭐
414
Script for detecting the WireLurker malware family
Wdbgark
⭐
412
WinDBG Anti-RootKit Extension
Osquery Attck
⭐
411
Mapping the MITRE ATT&CK Matrix with Osquery
Fcl
⭐
411
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Crypter
⭐
410
Crypter - Python3 based builder and ransomware compiled to Windows executable using PyInstaller
Avclass
⭐
408
AVClass malware labeling tool
Python Ransomware
⭐
403
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Open Source Threat Intel Feeds
⭐
403
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.
Phpmussel
⭐
402
PHP-based anti-virus anti-trojan anti-malware solution.
Engine
⭐
398
Droidefense: Advance Android Malware Analysis Framework
Eternalrocks
⭐
395
EternalRocks worm
Freki
⭐
395
🐺 Malware analysis platform
Mquery
⭐
395
YARA malware query accelerator (web frontend)
Psrecon
⭐
392
🚀 PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team. The data can be pushed to a share, sent over email, or retained locally.
Tweetfeed
⭐
389
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Process_doppelganging
⭐
383
My implementation of enSilo's Process Doppelganging (PE injection technique)
Ssma
⭐
380
SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]
Binlex
⭐
377
A Binary Genetic Traits Lexer Framework
Kernel Dll Injector
⭐
374
Kernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
S1em
⭐
373
This project is a SIEM with SIRP and Threat Intel, all in one.
Sirius Crypter
⭐
370
Telegram: @siriusdeveloper
Awesome Csirt
⭐
368
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Zelos
⭐
367
A comprehensive binary emulation and instrumentation platform.
Microbackdoor
⭐
360
Small and convenient C2 tool for Windows targets [Путин хуйло, Лукашенко тоже: шо один шо другой -- на говно похожи]
Cuckoo Modified
⭐
360
Modified edition of cuckoo
Moistpetal
⭐
357
Open source offensive security platform for red team, by red team.
Malsub
⭐
355
A Python RESTful API framework for online malware analysis and threat intelligence services.
Karton
⭐
353
Distributed malware processing framework based on Python, Redis and S3.
Gmailc2
⭐
350
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
Pysilon Malware
⭐
346
Advanced RAT written in Python language, fully controllable through Discord with dedicated GUI builder to make preparation easier.
Invizzzible
⭐
346
InviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Sems
⭐
340
Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools
Android_unpacker
⭐
339
A (hopefully) generic unpacker for packed Android apps.
Virii
⭐
335
Collection of ancient computer virus source codes
Transacted_hollowing
⭐
334
Transacted Hollowing - a PE injection technique, hybrid between ProcessHollowing and ProcessDoppelgänging
Related Searches
Python Malware (925)
Security Malware (277)
101-200 of 1,855 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.