DevonGriffith / Malware-ExamplesLinks
A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis
☆17Updated last year
Alternatives and similar repositories for Malware-Examples
Users that are interested in Malware-Examples are comparing it to the libraries listed below
Sorting:
- capNcook - a dark web exploration tool☆85Updated last year
- ☆243Updated 10 months ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆84Updated last year
- Automate installation of extra pentest tools on Kali Linux☆61Updated 4 years ago
- Explore a collection of resources and projects in Computer Science, covering algorithms, data structures, programming languages, and emer…☆67Updated 10 months ago
- ☆121Updated 3 years ago
- Autofill Phishing☆85Updated 4 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆281Updated last year
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆331Updated last year
- An automation script written in Python to convert a Raspberry Pi into a WiFi hacking device☆70Updated 3 years ago
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆61Updated 7 months ago
- Repository for security-related Python scripts.☆210Updated 3 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆221Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- Profile layout☆15Updated 4 months ago
- EthicalHacking, Python, Nmap, Metasploit☆244Updated 5 years ago
- ☆196Updated 3 months ago
- Malware attacks/techniques explained☆201Updated 6 months ago
- A collection of advanced Python scripts for cybersecurity, penetration testing, and ethical hacking.☆75Updated 10 months ago
- Default Kali Linux Wordlists (SecLists Included)☆170Updated 7 months ago
- Turning smart lights into Wifi Hacking implants.☆169Updated 11 months ago
- The Black Hat Bash book repository☆336Updated 5 months ago
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆207Updated 9 months ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆219Updated 2 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆138Updated 3 months ago
- SubnetWizard is a Python Based CLI tools for subnet calculating☆52Updated last year
- tool used to change your IP every second your want☆428Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆87Updated 7 months ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆167Updated 7 months ago
- ☆98Updated 3 years ago