VirusTotal Wanna Be - Now with 100% more Hipster
Organized list of my malware development resources
A framework that create an advanced stealthy dropper that bypass most AV...
Seven different DLL injection techniques in one single project.
Setup guide for NextDNS, a DoH proxy with advanced capabilities.
Linux/Windows post-exploitation framework made by linux user
A curated list of amazingly awesome Cybersecurity datasets
The Ultimate Unified Hosts file for protecting your network, computer, s...
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced ...
NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. Th...
Malcom - Malware Communications Analyzer
A curated list of awesome resources related to executable packing
ThePhish: an automated phishing email analysis tool
Research code & papers from members of vx-underground.
Phishing Domains, urls websites and threats database. We use the PyFunce...