504sarwarerror / BLACKWALLLinks
Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution
☆25Updated last month
Alternatives and similar repositories for BLACKWALL
Users that are interested in BLACKWALL are comparing it to the libraries listed below
Sorting:
- A RAG model trained on malware samples, It is designed to generate new malware☆40Updated 3 weeks ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆311Updated this week
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆42Updated last week
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆798Updated last year
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆93Updated last week
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆206Updated 3 weeks ago
- A modern and intuitive Chrome extension that brings your favorite OSINT tools, metadata analyzers, and Google Dorking assistants right in…☆60Updated 2 weeks ago
- A blind SQL injection brute forcer☆110Updated 5 months ago
- What the name says....☆99Updated last year
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆134Updated last week
- Phone: A Mobile Phone Forensic Framework ( Android )☆202Updated 6 months ago
- ☆208Updated 7 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆109Updated this week
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- Turning smart lights into Wifi Hacking implants.☆131Updated 7 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆379Updated last week
- Guide can be found at: www.ded-sec.space☆225Updated last week
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆18Updated 4 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆37Updated 3 weeks ago
- L0p4 Toolkit is a powerful hacking toolset designed for hacker's. It includes advanced tools for web hacking (SQLi, XSS), network scannin…☆72Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆187Updated 6 months ago
- About Osintgraph is an open-source tool that collects Instagram data, followers, and followees, storing them in Neo4j. It helps you easil…☆413Updated 3 weeks ago
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆834Updated 2 months ago
- Evil Crow Cable Pro device☆120Updated 5 months ago
- Password cracking research using the Have I Been Pwned (HIBP) dataset to evaluate the effectiveness of the PassGPT Large Language Model (…☆63Updated last year
- A Simple Discord Command and Control Client for Windows Machines using Powershell☆34Updated last month
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆86Updated 2 weeks ago