DevonGriffith / Malware-ExamplesLinks
A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis
☆17Updated 9 months ago
Alternatives and similar repositories for Malware-Examples
Users that are interested in Malware-Examples are comparing it to the libraries listed below
Sorting:
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆74Updated 11 months ago
- ☆203Updated 6 months ago
- tool used to change your IP every second your want☆397Updated last year
- capNcook - a dark web exploration tool☆73Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- Simple Python SSH Brute Forcing (Credential Stuffing)☆217Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆55Updated 4 years ago
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆471Updated last year
- EthicalHacking, Python, Nmap, Metasploit☆168Updated 4 years ago
- my notes☆220Updated 8 months ago
- CVE-2024-21413 PoC for THM Lab☆141Updated last year
- The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and secu…☆266Updated 10 months ago
- ☆355Updated last year
- Repository for security-related Python scripts.☆206Updated 2 years ago
- ☆169Updated last year
- Default Kali Linux Wordlists (SecLists Included)☆154Updated 3 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆563Updated last month
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆78Updated 3 months ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆314Updated 9 months ago
- https://shoulderhu.gitbook.io/tryhackme☆33Updated 3 years ago
- A collection of hacking / penetration testing resources to make you better!☆66Updated 7 years ago
- This study guide have some [practical labs] to test your knowledge and learn by doing.☆80Updated 2 years ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆200Updated last year
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆298Updated 2 weeks ago
- Recolored Kali Linux wallpapers☆124Updated last year
- TryHackMe Roadmap☆45Updated last year
- ☆42Updated 3 years ago
- Step into my GitHub treasure trove—an immersive collection of comprehensive notes chronicling my Certified Ethical Hacker (CEH) lab escap…☆31Updated 2 years ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆263Updated last year
- Profile layout☆14Updated 4 months ago