Augusto Morales's starred repositories
reverse_ssh
SSH based reverse shell
Villain
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
c-reverse-shell
A reverse shell for Windows and Linux written in C.
TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
DNS_Tunneling
DNS Tunneling using powershell to download and execute a payload. Works in CLM.
investigations
Indicators from Amnesty International's investigations
technical-interview-prep
These are coding solutions for problems I study while preparing for technical interviews at tech companies
course-gitbook
Full Stack Deep Learning Online Course
MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
tweetable-polyglot-png
Pack up to 3MB of data into a tweetable PNG polyglot file.
PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
Crash-iOS-Exploit
Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see the Unicode. Please do not intentionally abuse these exploits.
Swift-30-Projects
30 mini Swift Apps for self-study
Ransomware
Ransomware is a project written in .Net and shows how ransomeware generally works. This repository should be used for educational reasons only!!
biffud-ios-virus
Generic code to wrap a web app in an iOS app.
EvilPyKeyvil
Badass Python3 Keylogger With Live WebSocket Stream & HTTP Uploader
Evasions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
reputation-service-api
Leverage the Check Point’s threat intelligence to enrich your SIEM and SOAR solutions and to secure your business applications and websites by using simple RESTful APIs.
piholeparser
Pi-Hole Compatible lists
atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.