DevonGriffith / Malware-Examples
A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis
☆17Updated last month
Alternatives and similar repositories for Malware-Examples:
Users that are interested in Malware-Examples are comparing it to the libraries listed below
- ☆92Updated 2 years ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆51Updated 3 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆71Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆202Updated 11 months ago
- 📑 A collection of cheatsheets for pentesting tools☆16Updated 3 years ago
- ☆32Updated last year
- my notes☆169Updated 2 weeks ago
- E-books related to hacking helps you to know more about hacking.☆15Updated last year
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆207Updated last month
- capNcook - a dark web exploration tool☆57Updated 9 months ago
- The Black Hat Bash book repository☆220Updated last month
- Projects for security students and professionals☆154Updated 6 months ago
- Automate installation of extra pentest tools on Kali Linux☆49Updated 3 years ago
- GUI Osint Framework with Kali Linux☆144Updated last year
- CVE-2024-21413 PoC for THM Lab☆61Updated 10 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆514Updated 11 months ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆56Updated last month
- A curated list of free cybersecurity learning resources.☆127Updated 4 months ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆41Updated 2 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆118Updated last year
- This is a resource factory for anyone looking forward to starting bug hunting and Ethical hacking would require guidance as a beginner.☆101Updated 2 years ago
- An easy to use python code to do a DDoS attack.☆36Updated 9 months ago
- The Red Rabbit project is just what a hacker needs for everyday automation. Red Rabbit unlike most frameworks out there does not automate…☆180Updated last year
- Scripts for offensive security☆92Updated this week
- Unveiling the Hidden Layers of the Web – A Comprehensive Web Reconnaissance Tool☆209Updated 5 months ago
- Turning smart lights into Wifi Hacking implants.☆110Updated last month
- "Essential Kali Linux commands for ethical hackers and penetration testers."☆71Updated last year
- Here Are Some Popular Hacking PDF☆268Updated last month
- ☆18Updated 3 years ago