π CAUTION - Malicious files π
β47Feb 19, 2026Updated last week
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- Automated NoSQL database enumeration and web application exploitation tool.β25May 6, 2019Updated 6 years ago
- Extract endpoints from specific Git repository for fuzzingβ23Nov 3, 2020Updated 5 years ago
- An Advanced PHP Cryptography Frameworkβ16Feb 12, 2024Updated 2 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β42Dec 2, 2020Updated 5 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detectβ12Aug 1, 2020Updated 5 years ago
- SubDomain Finderβ13Nov 9, 2021Updated 4 years ago
- virus collectionβ14Apr 13, 2021Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Camerasβ12Nov 17, 2020Updated 5 years ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.β14Nov 25, 2022Updated 3 years ago
- β12Sep 22, 2022Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Dec 6, 2020Updated 5 years ago
- π A small Password Attackβ15Apr 1, 2024Updated last year
- With the help of this docker image, you can easily access PEzor on your system!β15Mar 10, 2022Updated 3 years ago
- Burp suite Certificate modification toolβ18Apr 23, 2023Updated 2 years ago
- Automated version of CVE-2018-14847 (MikroTik Exploit)β15Jun 12, 2025Updated 8 months ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themβ17Feb 1, 2021Updated 5 years ago
- The long shadow to emerge as other Git repositoriesβ18Feb 25, 2026Updated last week
- Central IoC scanner based on Lokiβ20Nov 12, 2021Updated 4 years ago
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizesβLinux-style find/grep/du made simpleβ¦β22Dec 20, 2025Updated 2 months ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.β15Apr 13, 2023Updated 2 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windowsβ139Oct 3, 2023Updated 2 years ago
- An advanced reverse shell written in Python3.β21Oct 30, 2020Updated 5 years ago
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python β¦β24Aug 29, 2021Updated 4 years ago
- PEDA - Python Exploit Development Assistance for GDBβ23Aug 6, 2025Updated 6 months ago
- β12Apr 8, 2022Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Aug 13, 2024Updated last year
- Bypass Cisco Umbrella DNS Proxy Firewall Restrictionsβ58Sep 24, 2023Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.β27Dec 29, 2021Updated 4 years ago
- Web application recon for bug bountyβ21Apr 19, 2020Updated 5 years ago
- A proof-of-concept Node.js ransomwareβ21Mar 27, 2022Updated 3 years ago
- Wi-Fi Exploit Toolβ50May 23, 2020Updated 5 years ago
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication seβ¦β26Jul 18, 2022Updated 3 years ago
- Big Data tool for metadata extraction (Exif), enrichment (using DeepLearning) and analysisβ29Jul 21, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapiaβ11Jan 2, 2023Updated 3 years ago
- Duitku Payment gateway for PHPNuxBillβ12Aug 23, 2025Updated 6 months ago
- A CDN Domain Fronting Tool or Websocket Discovery written in Pythonβ55Mar 13, 2023Updated 2 years ago
- Human Oriented SHellβ27Apr 1, 2024Updated last year
- Yet another web recon toolβ61Aug 9, 2023Updated 2 years ago
- Windows Privilege Escalationβ72Jun 7, 2022Updated 3 years ago