504sarwarerror / BLACKWALLLinks
Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution
☆26Updated last week
Alternatives and similar repositories for BLACKWALL
Users that are interested in BLACKWALL are comparing it to the libraries listed below
Sorting:
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆316Updated 3 weeks ago
- A RAG model trained on malware samples, It is designed to generate new malware☆41Updated this week
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆99Updated 2 weeks ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆49Updated this week
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆205Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆191Updated 2 weeks ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆421Updated 4 months ago
- ☆212Updated 7 months ago
- What the name says....☆99Updated last year
- Guide can be found at: www.ded-sec.space☆228Updated last week
- L0p4 Toolkit is a powerful hacking toolset designed for hacker's. It includes advanced tools for web hacking (SQLi, XSS), network scannin…☆74Updated 4 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆205Updated 6 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆801Updated last year
- Open-Source Phishing Toolkit☆240Updated 3 months ago
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆910Updated 2 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆559Updated 7 months ago
- A modern and intuitive Chrome extension that brings your favorite OSINT tools, metadata analyzers, and Google Dorking assistants right in…☆62Updated last week
- Phishing with a fake reCAPTCHA☆612Updated last year
- Embed a payload inside a PNG file☆347Updated 11 months ago
- The Darknet Market Bible☆99Updated 9 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- A blind SQL injection brute forcer☆111Updated 5 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆387Updated last week
- MCP Server for Metasploit☆315Updated 2 weeks ago
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆18Updated 5 months ago
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆637Updated 3 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆313Updated 5 months ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆40Updated last month