DevonGriffith / Malware-ExamplesLinks
A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis
☆17Updated 9 months ago
Alternatives and similar repositories for Malware-Examples
Users that are interested in Malware-Examples are comparing it to the libraries listed below
Sorting:
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆75Updated last year
- Cyberonix is a complete resource hub for Cyber Security Community. Our aim is to make this tool an 1 stop solution for all the Hackers ou…☆481Updated last year
- capNcook - a dark web exploration tool☆74Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- ☆117Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆56Updated 4 years ago
- ☆208Updated 7 months ago
- ☆173Updated last year
- capNcook - a dark web exploration tool☆113Updated 11 months ago
- HackerGPT Cyber-Security Companion☆58Updated last month
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆128Updated last year
- my notes☆221Updated last week
- A curated list of free cybersecurity learning resources.☆133Updated 2 weeks ago
- Repository for security-related Python scripts.☆207Updated 2 years ago
- EthicalHacking, Python, Nmap, Metasploit☆177Updated 4 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆219Updated 2 years ago
- Since the SecOps Group has offered free certification to Certified Appsec Practitioner I will be creating notes here. I will be working o…☆77Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- Bash For Ethical Hacking☆72Updated 2 years ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆205Updated 2 years ago
- Autofill Phishing☆76Updated last month
- https://shoulderhu.gitbook.io/tryhackme☆33Updated 3 years ago
- A tool for automatically change the Tor IP address over time.☆98Updated 5 months ago
- Extract Windows Wi-Fi Passwords to Remote URL☆269Updated 3 years ago
- || CEH Notes ||☆102Updated 2 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆97Updated 2 years ago
- tool used to change your IP every second your want☆400Updated last year
- This study guide have some [practical labs] to test your knowledge and learn by doing.☆83Updated 2 years ago
- Repository of practice, guides, list, and scripts to help with cyber security.☆297Updated 2 years ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆602Updated 2 months ago