504sarwarerror / RABIDSLinks
Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research
☆319Updated this week
Alternatives and similar repositories for RABIDS
Users that are interested in RABIDS are comparing it to the libraries listed below
Sorting:
- Curated repository of malware samples preserved for research and analysis. All samples are kept behind Blackwall poke around with caution☆30Updated 3 weeks ago
- A RAG model trained on malware samples, It is designed to generate new malware☆43Updated last month
- Unofficial DedSec Project GitHub Repository☆340Updated last week
- ☆227Updated 9 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆275Updated last year
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆440Updated 6 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated 2 months ago
- Autofill Phishing☆82Updated 3 months ago
- capNcook - a dark web exploration tool☆82Updated last year
- Malware attacks/techniques explained☆194Updated 4 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆211Updated 2 months ago
- ☆67Updated last year
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆669Updated last week
- Bookmarklet to find endpoints easily with one click☆71Updated last year
- Phone: A Mobile Phone Forensic Framework ( Android )☆207Updated 8 months ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆401Updated last month
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆396Updated last month
- Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind☆51Updated 3 weeks ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆146Updated last week
- A blind SQL injection brute forcer☆114Updated 7 months ago
- This is a local search engine to search for cybersecurity tools. It has 3000+ tools in it's database.☆110Updated last month
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆215Updated 2 years ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆43Updated 3 weeks ago
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆345Updated last year
- PDFs of awesome cybersecurity info☆22Updated last week
- Phishing with a fake reCAPTCHA☆624Updated last year
- What the name says....☆103Updated last year
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆569Updated last month
- Turning smart lights into Wifi Hacking implants.☆146Updated 9 months ago
- BlueToolkit is an extensible Bluetooth Classic vulnerability testing framework that helps uncover new and old vulnerabilities in Bluetoo…☆613Updated 3 months ago