504sarwarerror / 504SARWARERRORLinks
Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind
☆42Updated last week
Alternatives and similar repositories for 504SARWARERROR
Users that are interested in 504SARWARERROR are comparing it to the libraries listed below
Sorting:
- A RAG model trained on malware samples, It is designed to generate new malware☆40Updated 3 weeks ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆311Updated this week
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆106Updated 2 years ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆206Updated 3 weeks ago
- Wireless Hacking Devices Protocol client☆233Updated this week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- Evil Crow Cable Pro device☆120Updated 5 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆140Updated 2 weeks ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆363Updated this week
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- A blind SQL injection brute forcer☆110Updated 5 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆219Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆309Updated 5 months ago
- Open-Source CLI Penetration Testing Tool To Automate Various Processes☆45Updated last year
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆48Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆263Updated 3 months ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆163Updated last month
- A tool for mapping cyber crime☆154Updated 5 months ago
- A repository of credential stealer formats☆227Updated 3 months ago
- ☆28Updated 2 years ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 6 months ago
- Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution☆25Updated last month
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆95Updated last year
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last month
- Small offensive network toolkit for Raspberry Pi (+ Waveshare 1.44″ LCD HAT) inspired by sharkjack fonctionnalities. For redteam and edu…☆212Updated last month
- A visual methodology tracking platform tailored for offensive security assessments☆211Updated this week
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆37Updated 3 weeks ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆412Updated 4 months ago