504sarwarerror / RABIDSLinks
Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research
☆311Updated this week
Alternatives and similar repositories for RABIDS
Users that are interested in RABIDS are comparing it to the libraries listed below
Sorting:
- Guide can be found at: www.ded-sec.space☆225Updated last week
- ☆208Updated 7 months ago
- A RAG model trained on malware samples, It is designed to generate new malware☆40Updated 3 weeks ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- Autofill Phishing☆76Updated last month
- Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution☆25Updated last month
- Turning smart lights into Wifi Hacking implants.☆131Updated 7 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆602Updated 2 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆206Updated 3 weeks ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆412Updated 4 months ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆37Updated 3 weeks ago
- Bookmarklet to find endpoints easily with one click☆65Updated last year
- capNcook - a dark web exploration tool☆74Updated last year
- Phone: A Mobile Phone Forensic Framework ( Android )☆202Updated 6 months ago
- Self-hosted tiny web C2 framework for dynamically managing PowerShell/BashScript payloads and collecting exfiltrated data☆18Updated 4 months ago
- WiFi Penetration Testing & Auditing Tool☆553Updated 4 months ago
- What the name says....☆99Updated last year
- A blind SQL injection brute forcer☆110Updated 5 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆379Updated last week
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆332Updated last year
- Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations…☆798Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆219Updated 2 years ago
- Malware attacks/techniques explained☆187Updated 2 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆134Updated last week
- A modern and intuitive Chrome extension that brings your favorite OSINT tools, metadata analyzers, and Google Dorking assistants right in…☆60Updated 2 weeks ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆42Updated last week
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆553Updated 3 weeks ago
- Advanced phishing investigation and disruption toolkit written in Python xo☆38Updated 3 weeks ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆48Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆198Updated 2 months ago