BushidoUK / Malware-ZooView external linksLinks
Hashes of infamous malware
☆26Jul 10, 2023Updated 2 years ago
Alternatives and similar repositories for Malware-Zoo
Users that are interested in Malware-Zoo are comparing it to the libraries listed below
Sorting:
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Jun 4, 2022Updated 3 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- ☆150Jun 14, 2023Updated 2 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- Enter the domain name once and gather information about it with 33 tools☆49Sep 7, 2023Updated 2 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- ☆27May 1, 2020Updated 5 years ago
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- ☆34Jun 13, 2023Updated 2 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- XSS scanning with Dalfox on Github-action☆26Nov 26, 2023Updated 2 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆33Jan 5, 2022Updated 4 years ago
- CIT Cyber Security Cell Bootcamp Training modules☆38Apr 7, 2021Updated 4 years ago
- Quick Cache and Archive search buttons☆38May 11, 2024Updated last year
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Jun 11, 2024Updated last year
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆768Updated this week
- ☆10Aug 9, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- ☆15Mar 21, 2025Updated 10 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Google Custom Search Engines for searching in code repositories☆35Mar 26, 2024Updated last year
- DNS Enumeration and Reconnaissance Tool☆36Jan 19, 2016Updated 10 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- ☆10Jun 13, 2024Updated last year
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- The Open Tor Botnet (ZIB)☆33Aug 14, 2015Updated 10 years ago
- ☆11Dec 5, 2020Updated 5 years ago
- Test google/or-tools java packages☆13Jan 16, 2026Updated 3 weeks ago
- ☆12Feb 16, 2023Updated 2 years ago