-
Updated
May 31, 2021 - Python
#
malware
Here are 1,202 public repositories matching this topic...
python
security
privacy
protection
anti-virus
malware
ad-blocker
unified-hosts
porn-filter
social-media-filter
hosts
gambling-filter
ransomware
pornblocker
trojans
curated-sources
A collection of hacking / penetration testing resources to make you better!
exploit
reverse-engineering
malware
mitm
hacking
owasp
penetration-testing
ctf
privilege-escalation
buffer-overflow
windows-privilege-escalation
privilege-escalation-linux
-
Updated
Nov 11, 2020
The Rogue Access Point Framework
-
Updated
Apr 27, 2021 - Python
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
windows
linux
awesome
osint
malware
hacking
resources
sql-injection
csrf
awesome-list
pentesting
malware-analysis
bugbounty
kali-linux
hacking-tool
dork
information-gathering
xxe
redteam
osint-resources
-
Updated
Apr 14, 2021
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
-
Updated
Mar 28, 2021 - Python
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
linux
backdoor
tool
accessibility
malware
remote
hacking
trojan
rat
dracos
antivirus
bypass
kali-linux
thefatrat
autorun
bypass-av
metasploit-framework
msfvenom
bypassantivirus
remote-access
-
Updated
Apr 3, 2021 - C
An advanced memory forensics framework
-
Updated
Mar 7, 2021 - Python
Collection of malware source code for a variety of platforms in an array of different programming languages.
-
Updated
May 31, 2021 - Assembly
A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
c
c-plus-plus
arm
hack
assembly
x64
reverse-engineering
malware
hacking
cybersecurity
assembly-language
x86
cyber
assembly-language-programming
cyber-security
arm-assembly
reverse-engineering-tutorial
cyber-threat-intelligence
assembly-x86-64
assembly-arm
-
Updated
May 29, 2021 - C
Malicious traffic detection system
-
Updated
May 31, 2021 - Python
Android virtual machine and deobfuscator
android
java
emulator
optimization
virtual-machine
reverse-engineering
malware
deobfuscation
malware-analyzer
dalvik
malware-analysis
malware-research
deobfuscator
android-malware
reverse-engineer-apk
-
Updated
May 23, 2021 - Java
Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
malware
code-injection
timing-attacks
anti-debugging
anti-analysis
anti-sandbox
anti-vm
anti-emulation
av-bypass
sandbox-evasion
anti-disassembly
-
Updated
Feb 12, 2021 - C++
Qiling Advanced Binary Emulation Framework
emulator
framework
analysis
binary
reverse-engineering
malware
uefi
unicorn-emulator
unicorn-engine
qiling
cross-architecture
-
Updated
May 31, 2021 - Python
Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
nginx
bots
malware
porn-filter
gambling-filter
spyware
spam-prevention
spambot-security
spam-protection
adware
nginx-server
spam-filtering
scanners
referrer-spam
spam-referers
spam-blocker
referer-blocker
vulnerability-scanners
bot-blocker
spam-referrer-blocker
-
Updated
May 30, 2021 - Shell
FireEye Labs Obfuscated String Solver - Automatically extract obfuscated strings from malware.
-
Updated
May 27, 2021 - Python
Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.
-
Updated
Mar 7, 2021 - C
ipsets dynamically updated with firehol's update-ipsets.sh script
-
Updated
May 31, 2021 - Shell
Awesome hacking is an awesome collection of hacking tools.
-
Updated
May 19, 2021 - Python
Open
Better URL Regex
bee-san
commented
May 27, 2021
We do not match on:
google.com
Because there is no HTTPS at the start.
The solution is to build a list of all top level domains ( see https://data.iana.org/TLD/tlds-alpha-by-domain.txt for all of them in a neat text file) and match only if the end matches a TLD.
An example regex is:
.*\.com|\.org
Which matches:
tryhackme.com
Let's make an annoyance free, better open internet, altogether!
tracker
security
tracking
privacy
protection
ad
advertisement
malware
ad-blocker
adblock
ransomware
spyware
ad-block
spy
porn
trojans
ads-blocker
spams
pornware
-
Updated
May 31, 2021 - Shell
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox and it is able to scan Android devices against VT and HA.
malware
virustotal
alienvault
valhalla
malshare
threatcrowd
urlhaus
threathunting
malpedia
polyswarm
hybridanalysis
-
Updated
May 2, 2021 - Python
VirusTotal Wanna Be - Now with 100% more Hipster
docker
golang
elasticsearch
cloud
malware
dfir
cybersecurity
infosec
antivirus
malware-analysis
malware-research
virustotal
malice
-
Updated
Mar 18, 2019 - Go
jvoisin
commented
May 31, 2018
Currently, we're not detecting a lot of @wireghoul's htaceess-based webshells. It would be nice to improve the situation :)
1
Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
osint
tools
powershell
malware
hacking
network-monitoring
vulnerability
hacker
gathering
social-engineering
ethicalhacking
-
Updated
May 1, 2021
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
backdoor
powershell
persistence
malware
phishing
hacking
smile
scam
spoofing
pentest
kali-linux
avs
hacking-tool
anti-forensics
windows-hacking
execution-policy-bypass
social-engineering
uac-bypass
kill-antivirus
runas
dr0p1t
-
Updated
Nov 3, 2018 - Python
Improve this page
Add a description, image, and links to the malware topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the malware topic, visit your repo's landing page and select "manage topics."


Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions