504sarwarerror / RABIDSLinks
Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research
☆317Updated last month
Alternatives and similar repositories for RABIDS
Users that are interested in RABIDS are comparing it to the libraries listed below
Sorting:
- Unofficial DedSec Project GitHub Repository☆234Updated last week
- Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution☆29Updated this week
- ☆221Updated 8 months ago
- A RAG model trained on malware samples, It is designed to generate new malware☆43Updated 3 weeks ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆643Updated 3 months ago
- Autofill Phishing☆80Updated 2 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆208Updated 2 months ago
- capNcook - a dark web exploration tool☆79Updated last year
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆431Updated 5 months ago
- Turning smart lights into Wifi Hacking implants.☆134Updated 8 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆537Updated 3 months ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆211Updated 2 years ago
- Malware attacks/techniques explained☆191Updated 4 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated last month
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆145Updated last week
- Bookmarklet to find endpoints easily with one click☆68Updated last year
- A blind SQL injection brute forcer☆111Updated 6 months ago
- Ethical hacking toolkit for iOS devices using iSH Shell.☆132Updated 3 weeks ago
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆51Updated 3 weeks ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆202Updated 3 months ago
- What the name says....☆101Updated last year
- Phone: A Mobile Phone Forensic Framework ( Android )☆205Updated 7 months ago
- WiFi Penetration Testing & Auditing Tool☆589Updated 6 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆391Updated last month
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆344Updated last year
- Educational Linux privilege escalation script for CTFs/OSCP. Explains WHAT/WHY/HOW for every vulnerability found. Highlights critical fin…☆43Updated 3 weeks ago
- PDFs of awesome cybersecurity info☆19Updated 2 weeks ago
- BLE cha0s t00lkit xox☆54Updated 3 weeks ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆167Updated 5 months ago