Malicious

Packj : Large-Scale Security Analysis Platform To Detect Malicious/Risky Open-Source Packages

Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable…

2 years ago

BadOutlook : Malicious Outlook Reader

BadOutlook is a simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based…

4 years ago

Self XSS : Grab Cookies Tricking Users Into Running Malicious Code

Self XSS attack using bit.ly to grab cookies tricking users into running malicious code. How it works? It is a…

4 years ago

GodOfWar : Malicious Java WAR Builder With Built-In Payloads

GodOfWar is a command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby. Features…

6 years ago

Flightsim : Utility to Generate Malicious Network Traffic & Evaluate Controls

Flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network…

6 years ago

Hostintel : A Modular Python App to Collect Intelligence for Malicious Hosts

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence…

6 years ago

IoT Home Guard : A Tool for Malicious Behavior Detection in IoT Devices

IoT Home Guard is a project to help people discover malware in smart home devices. For users the project can…

6 years ago

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis Of Malicious Documents

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph,…

6 years ago

Malicious Apps Change Their Name To Be Back On Google Play Store

The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google…

7 years ago