DevonGriffith / Malware-ExamplesLinks
A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis
☆17Updated 7 months ago
Alternatives and similar repositories for Malware-Examples
Users that are interested in Malware-Examples are comparing it to the libraries listed below
Sorting:
- Simple Python SSH Brute Forcing (Credential Stuffing)☆216Updated 2 years ago
- tool used to change your IP every second your want☆363Updated last year
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆443Updated last year
- capNcook - a dark web exploration tool☆72Updated last year
- BlackHat C++ : C++ For Pentesters, by EC-Council☆67Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆75Updated last month
- Automate installation of extra pentest tools on Kali Linux☆57Updated 4 years ago
- ☆117Updated 2 years ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆313Updated 8 months ago
- Repository for security-related Python scripts.☆205Updated 2 years ago
- Default Kali Linux Wordlists (SecLists Included)☆152Updated last month
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆71Updated 10 months ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆128Updated last year
- HackerGPT Cyber-Security Companion☆49Updated 7 months ago
- ☆194Updated 5 months ago
- ☆162Updated last year
- The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and secu…☆255Updated 9 months ago
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆270Updated this week
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆421Updated this week
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆195Updated last year
- ☆146Updated 2 years ago
- Black Hat Python: Python for Pentesters, by EC-Council☆31Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆94Updated last year
- Here are some of the most important cyber security tools.☆43Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆77Updated last year
- Built to learn ethical hacking on your own☆137Updated last year
- my notes☆216Updated 6 months ago
- https://github.com/hmaverickadams☆17Updated 4 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆198Updated 3 months ago