0x4meliorate / FISHYLinks
Advanced Phishing Attack.
☆11Updated 4 years ago
Alternatives and similar repositories for FISHY
Users that are interested in FISHY are comparing it to the libraries listed below
Sorting:
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Provides access to libhashcat☆30Updated last year
- ☆28Updated 4 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆23Updated 4 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆14Updated 5 years ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆84Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Carbanak leaked source☆73Updated 7 years ago
- Simplified go-cat agent for caldera☆10Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆17Updated 4 years ago
- Port of "watershell" made by an alumni (wumb0) that I decided to port to C++☆2Updated 3 years ago
- The goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS☆37Updated 2 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆13Updated 7 years ago
- Sources code extracted from malwares for analysis☆37Updated 2 years ago
- Golang ransomware☆46Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- A Swift port of some of the original PersistentJXA projects by D00MFist. Original PersistentJXA repo: https://github.com/D00MFist/Persist…☆32Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Expose local port of a remote victim over Internet☆11Updated 5 years ago
- A simple yet beautiful phishing proxy.☆56Updated 3 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago