DevonGriffith / Malware-ExamplesLinks
A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis
☆17Updated 11 months ago
Alternatives and similar repositories for Malware-Examples
Users that are interested in Malware-Examples are comparing it to the libraries listed below
Sorting:
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆81Updated last year
- ☆118Updated 3 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- Repository for security-related Python scripts.☆207Updated 2 years ago
- ☆398Updated last year
- ☆221Updated 8 months ago
- Extract Windows Wi-Fi Passwords to Remote URL☆270Updated 3 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆218Updated 2 years ago
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆498Updated last year
- ChatGPT for Ethical Hackers, by EC-Council☆36Updated 7 months ago
- Automate installation of extra pentest tools on Kali Linux☆56Updated 4 years ago
- The Black Hat Bash book repository☆309Updated 3 months ago
- tool used to change your IP every second your want☆413Updated last year
- Shodan Dorks☆462Updated 8 months ago
- capNcook - a dark web exploration tool☆117Updated last year
- Malware attacks/techniques explained☆191Updated 4 months ago
- capNcook - a dark web exploration tool☆79Updated last year
- An automation script written in Python to convert a Raspberry Pi into a WiFi hacking device☆68Updated 3 years ago
- Default Kali Linux Wordlists (SecLists Included)☆164Updated 5 months ago
- EthicalHacking, Python, Nmap, Metasploit☆209Updated 5 years ago
- The distro is for penetration testing and ethical hacking and also privacy, hardened, secure, anonymized Linux distro.Predator Linux has …☆124Updated 9 months ago
- my notes☆225Updated last month
- Lists various tools used in hardware hacking.☆26Updated 7 months ago
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆83Updated 5 months ago
- Work in progress...☆514Updated last year
- A collection of hacking / penetration testing resources to make you better!☆69Updated 7 years ago
- One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.☆46Updated 7 months ago
- ☆433Updated 3 years ago
- HackerGPT Cyber-Security Companion☆63Updated 2 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆202Updated 7 months ago