ForbiddenProgrammer / MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
☆10Updated 4 years ago
Alternatives and similar repositories for MalwareSourceCode
Users that are interested in MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Wordlist generated using leaked databases, Pipal, and CUPP.☆33Updated 7 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 6 years ago
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆13Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆81Updated 5 years ago
- Mobile Pentesting Guide (WIP)☆23Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Bu…☆38Updated 7 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆22Updated 3 years ago
- Notes and Commands for CTFs☆22Updated 5 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆60Updated 4 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- ☆52Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Install popular tools used while pentesting & playing labs☆14Updated 3 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆29Updated 6 years ago