504sarwarerror / RABIDSLinks
Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research
☆316Updated 3 weeks ago
Alternatives and similar repositories for RABIDS
Users that are interested in RABIDS are comparing it to the libraries listed below
Sorting:
- Guide can be found at: www.ded-sec.space☆228Updated last week
- A RAG model trained on malware samples, It is designed to generate new malware☆41Updated this week
- Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution☆26Updated last week
- ☆212Updated 7 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆205Updated last month
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- Autofill Phishing☆79Updated last month
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆637Updated 3 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆378Updated this week
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆421Updated 4 months ago
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆99Updated 2 weeks ago
- A blind SQL injection brute forcer☆111Updated 5 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated 3 weeks ago
- capNcook - a dark web exploration tool☆77Updated last year
- Phone: A Mobile Phone Forensic Framework ( Android )☆205Updated 6 months ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆208Updated 2 years ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆40Updated last month
- Turning smart lights into Wifi Hacking implants.☆131Updated 8 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆198Updated 2 months ago
- Malware attacks/techniques explained☆189Updated 3 months ago
- Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical fin…☆38Updated last week
- What the name says....☆99Updated last year
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆139Updated 2 weeks ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆49Updated this week
- A modern and intuitive Chrome extension that brings your favorite OSINT tools, metadata analyzers, and Google Dorking assistants right in…☆62Updated last week
- Bookmarklet to find endpoints easily with one click☆68Updated last year
- A portable ESP8266-based device for Evil Twin and deauthentication attacks with customizable phishing pages.☆142Updated 8 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆122Updated 3 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆387Updated last week
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆336Updated last year