Pinned Repositories
al-khaser
(This is a fork used primarily to submit patches into upstream repository) Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
Assembly
awesome-reverse-engineering
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
BackDoor
Code
On successfull way there are not footprints of lazy man.
Dropper
simple dropper
Dropper-Malware-Using-LSB-Algorithm
LSB-Stenography
stenography with LSB algorithm
kiwiahn's Repositories
kiwiahn/Updated-Carbanak-Source-with-Plugins
https://twitter.com/itsreallynick/status/1120410950430089224