Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation malware
exploitation
x
malware
x
20 search results found
Awesome Hacking Resources
⭐
14,679
A collection of hacking / penetration testing resources to make you better!
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Malware
⭐
692
Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com
Fireelf
⭐
637
fireELF - Fileless Linux Malware Framework
Mxtract
⭐
573
mXtract - Memory Extractor & Analyzer
Php Antimalware Scanner
⭐
560
AMWScan (PHP Antimalware Scanner) is a free tool to scan php files and analyze your project to find any malicious code inside it.
Eternalrocks
⭐
395
EternalRocks worm
Awesome Csirt
⭐
368
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Daily Info
⭐
280
Godgenesis
⭐
260
A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoints.
Ddos
⭐
254
All about DDoS attacks, exploits, botnets and some proxies =)
Resource List
⭐
199
GitHub Project Resource List
Smmbackdoorng
⭐
193
Updated version of System Management Mode backdoor for UEFI based platforms: old dog, new tricks
Avpwn
⭐
191
List of real-world threats against endpoint protection software
Malwaredatabase
⭐
175
One of the few malware collection
Exploit Discord Cache System Poc
⭐
170
🗄️ Exploit Discord's cache system to remote upload payloads to Discord users machines (possible malware dropper for e.g. targeting specific victims)
Rpisec Courses
⭐
145
Uac Exploit
⭐
124
Confirmation message bypass
Hatvenom
⭐
122
HatVenom is a powerful payload generation tool that provides support for all common platforms and architectures.
Awesome Malware
⭐
118
💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Xhunter
⭐
118
Remote Administrator Tool [ RAT For Android ] No Port Forwarding
Securitysite
⭐
117
收集了一些安全公司的博客
Re101in20min
⭐
98
Slides for Reverse Engineering 101 in 20 minutes as presented at Pancakes Con
Articulos
⭐
88
Artículos relacionados a la Ciberseguridad y Hacking.
Bromalware Exercise
⭐
80
Vmclarity
⭐
77
VMClarity is a tool for agentless detection and management of Virtual Machine Software Bill Of Materials (SBOM) and vulnerabilities
Security Study Tutorial
⭐
70
Summary of online learning materials
Iat_api
⭐
65
Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Syscalldumper
⭐
64
Dump system call codes, names, and offsets from Ntdll.dll
Mimirust
⭐
58
MimiRust - Hacking the Windows operating system to hand us the keys to the kingdom with Rust.
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Cyber_threat_intelligence
⭐
55
Cyber Threat Intelligence Data, Indicators, and Analysis
Maalik
⭐
54
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Forceadmin
⭐
53
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Mal_getter
⭐
41
Tool for dropping malware from EK
Akilt
⭐
39
A Windows Botnet written in Golang
Wordpress Malware
⭐
36
Collection of malware files found on WordPress sites
Malware
⭐
34
😈 CAUTION - Malicious files 💀
Awesome Hacking Resources
⭐
33
Fatebot
⭐
29
IRC botnet, that's mainly used to launch denial-of-service attacks.
Malware
⭐
27
Winrarer Ransomware
⭐
25
Malware
⭐
23
Malware Souk
⭐
23
Collaborative malware exchange repository.
Articulos
⭐
22
Artículos relacionados a la Ciberseguridad, Hacking y al Análisis de Malware.
Ekworkshop
⭐
21
BSidesLV 2015 Exploit Kit Analysis Workshop Files
Cs6035_intro_to_info_security
⭐
19
Batobfuscate
⭐
18
A simple script to obfuscate batch(bat) code easily
Stealthware Backdoor
⭐
18
Persistent & Undetectable Malware Backdoor
Exposingneutrino
⭐
16
Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)
Dd
⭐
15
6 Eyed Spider
⭐
14
Post-exploitation tool collects data going out and coming into the browser and makes use of it.
Swaravm
⭐
14
SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, malware analysis, digital forensics, vulnerability research and exploitation, reverse engineering, mobile and web application assessment, alongside a variety of mobile application practice labs.
Backdoorcreator
⭐
10
This tool will create backdoor
Fudransome
⭐
10
Generate FUD Ransomeware For Windows, Linux and MAC OS
Project Evoli
⭐
10
Project Evoli. PyPi Extention for Creating Loggers,Grabbers and Rats
Huntsman
⭐
9
A versatile and highly concurrent malware written in golang.
Sap_ransomware
⭐
9
Simple remote command execution exploit code for SAP GUI
Hta Exploit
⭐
9
Flame Sourcecode
⭐
9
Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.
Sharprat
⭐
8
A Basic Proof Of Concept Remote Administration Tool Written In C# With Functioning Exploits
Re_mal_exploit_tutorials
⭐
8
my reading list for reverse engineering malware & exploit development
Cyberworld
⭐
8
Dataset
⭐
6
nao dataset
Malware
⭐
5
Yara Rules
⭐
5
My small collection of yara rules for classifying and detecting malware/exploits
Androidoverlaypoc
⭐
5
Cve 2014 4936
⭐
5
Repository for CVE-2014-4936 POC code.
Blog
⭐
5
https://strm.sh website source code
Pwn_exhibit
⭐
5
Just a temporary website to post my ctf writeups and journey into binary/android exploitation/malware analysis/exploit development
Smbd Cpuminer Infection Fix
⭐
5
A Samba exploit turned Linux into a goldmine. Those infected by the malware would have their systems mining cryptocurrency 24/7, causing their cpu to maintain a 100% usage. My droplet was infected, these were the steps to remove the infection.
Mr.peter
⭐
5
Silent Screenshot Capture | Post Exploitation Payload | VB.NET
Emv
⭐
5
Exploit, Malware and Vulnerability Scoring Application
Related Searches
Python Exploitation (1,616)
Python Malware (925)
Exploitation Cve (771)
Vulnerabilities Exploitation (629)
C Exploitation (545)
Security Exploitation (439)
Exploitation Penetration Testing (387)
Security Malware (277)
1-20 of 20 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.