FlatL1neAPT / MalwareLinks
☆18Updated 7 years ago
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- ☆18Updated 7 years ago
- ☆40Updated 7 years ago
- Tool for dropping malware from EK☆40Updated 7 years ago
- Executables that execute other stuff☆54Updated 7 years ago
- Modules created by Nettitude for Metasploit☆12Updated 7 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Updated 7 years ago
- A collection of useful radare2 scripts!☆32Updated 7 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- ☆11Updated 6 years ago
- WAF Exploitation Framework☆13Updated 2 years ago
- Upgrade your netcat shell today!☆58Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- VBA Reversed TCP Meterpreter Stager☆64Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 6 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- ☆15Updated 11 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 4 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆129Updated 12 years ago
- Collection of IronPython scripts and executables for penetration testing☆56Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- PoC dlls for Task Scheduler COM Hijacking☆93Updated 9 years ago
- Group Policy Hijacking☆32Updated 7 years ago
- Burp Suite extension to help make Graphql request more readable☆33Updated 7 years ago