linux.mirai

Mirai botnet code

Leaked Linux.Mirai source code for research and development purposes.

Leaked Linux.Mirai Source Code for Research/IoC Development Purposes

GitHub

555 stars
52 watching
245 forks
Language: C
last commit: almost 9 years ago
Linked from 1 awesome list

botnetiocioc-developmentiotleaklinuxmalwaremalware-analysismalware-developmentmalware-researchmiraimirai-source

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
jgamblin/mirai-source-code Releases leaked source code for a Mirai BotNet developed in C, intended for research and IoT development purposes. 8,568
eset/malware-ioc A repository of malware indicators and rules for threat hunting and analysis. 1,698
doctorwebltd/malware-iocs A collection of threat intelligence data, specifically malware indicators related to compromise events. 221
pr0xylife/emotet A collection of indicators of compromise related to a malware family used for financial crimes and other malicious activities 56
gosecure/malware-ioc Provides a set of standardized indicators to help detect and assess malware presence 10
mtnmunuklu/alterix Converts detection rules and IOCs to be usable with a proprietary SIEM product 15
marcusbotacin/linux.malware A Linux-specific malware analysis project 2
armbues/ioc_parser Extracts indicators of compromise from PDF security reports 430
sonoro1234/cimgui An intermediate layer to enable use of Dear ImGui from languages interfacing with C. 22
telekom-security/malware_analysis An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. 110
neo23x0/fenrir A simple Bash script to scan Linux/Unix systems for Indicators of Compromise (IOCs) without installing additional software or agents. 702
chronicle/gcti This repository contains signature files for detecting malicious software 533
spyre-project/spyre A modular host-based IOC scanner built around YARA pattern matching engine 164
fl0x2208/iocs-in-csv-format A collection of IOCs in CSV format for tracking APT, Cyber Crimes, Malware and Trojan activity 12