Black-Hell-Team / sppen
Malware and malicious applications database
☆37Updated 7 months ago
Alternatives and similar repositories for sppen:
Users that are interested in sppen are comparing it to the libraries listed below
- Ransomware hello kitty☆22Updated 3 years ago
- An open-source .NET Ransomware☆24Updated 3 years ago
- Advanced Vulnerability Scanner Tool☆69Updated 7 months ago
- A reverse TCP payload and listener both written in python3.☆30Updated 7 months ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆31Updated 2 years ago
- ☆15Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated 8 months ago
- Windows Hacking FrameWork using Reverse Shell☆101Updated last week
- Bifrost C2. Open-source post-exploitation using Discord API☆46Updated 3 years ago
- A builder for BatchStealer☆22Updated 2 years ago
- Cryptowall Ransomware from Mr Robot serie S2E1 and S2E2☆26Updated 8 months ago
- Simple script to bulk check if IPs match networks☆11Updated 3 years ago
- An ADB-based botnet written in C.☆41Updated 2 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆61Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- the assembly shell and backdoor Trojan☆17Updated 3 years ago
- Automated sqlmap☆19Updated 2 years ago
- Script to facilitate different functions and checks☆45Updated 2 years ago
- SpyNote [ Android RAT ] 6.4-SRC☆20Updated 3 years ago
- Well, I have created this shit for educational pruposes (I think)☆34Updated 2 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆38Updated 3 months ago
- A collection of malwares found on the internet.☆57Updated last year
- Repository of tools used in my blog☆50Updated 10 months ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆39Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆58Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 8 months ago
- Community driven computer worm☆59Updated 2 years ago
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆112Updated 3 years ago