504sarwarerror / BLACKWALLLinks
Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution
☆30Updated 3 weeks ago
Alternatives and similar repositories for BLACKWALL
Users that are interested in BLACKWALL are comparing it to the libraries listed below
Sorting:
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆319Updated this week
- A RAG model trained on malware samples, It is designed to generate new malware☆43Updated last month
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆110Updated last month
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆51Updated 3 weeks ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆275Updated last year
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆442Updated 6 months ago
- What the name says....☆103Updated last year
- track, trace, and take down with SCAMTRACK☆29Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆209Updated last month
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆569Updated last month
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆146Updated last week
- A modern and intuitive Chrome extension that brings your favorite OSINT tools, metadata analyzers, and Google Dorking assistants right in…☆72Updated last month
- Malware attacks/techniques explained☆194Updated 4 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆324Updated 7 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆207Updated 8 months ago
- PDFs of awesome cybersecurity info☆22Updated last week
- Phishing with a fake reCAPTCHA☆624Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆211Updated 2 months ago
- Embed a payload inside a PNG file☆360Updated last year
- ☆227Updated 9 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆44Updated 7 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆669Updated last week
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆396Updated last month
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆54Updated 6 months ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆43Updated 3 weeks ago
- Autofill Phishing☆82Updated 3 months ago
- L0p4 Toolkit is a powerful hacking toolset designed for hacker's. It includes advanced tools for web hacking (SQLi, XSS), network scannin…☆92Updated 5 months ago
- Bookmarklet to find endpoints easily with one click☆71Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆205Updated 4 months ago