504sarwarerror / BLACKWALLLinks
Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution
☆29Updated this week
Alternatives and similar repositories for BLACKWALL
Users that are interested in BLACKWALL are comparing it to the libraries listed below
Sorting:
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆317Updated last month
- A RAG model trained on malware samples, It is designed to generate new malware☆43Updated 3 weeks ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆51Updated 3 weeks ago
- ☆221Updated 8 months ago
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆103Updated last month
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆643Updated 3 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆145Updated last week
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆202Updated 3 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆208Updated 2 months ago
- The Darknet Market Bible☆104Updated 10 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆562Updated 2 weeks ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆206Updated last week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆116Updated 2 weeks ago
- What the name says....☆101Updated last year
- A blind SQL injection brute forcer☆111Updated 6 months ago
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆802Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated last month
- Autofill Phishing☆80Updated 2 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆205Updated 7 months ago
- This is for Ethical Use only.☆439Updated 5 months ago
- Turning smart lights into Wifi Hacking implants.☆134Updated 8 months ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆146Updated 2 weeks ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆431Updated 5 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆391Updated last month
- About Osintgraph is an open-source tool that collects Instagram data, followers, and followees, storing them in Neo4j. It helps you easil…☆457Updated 2 months ago
- Embed a payload inside a PNG file☆356Updated last year
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆317Updated 6 months ago
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆944Updated last week