Gexos / malrepo
A collection of malware samples caught by DIONAEA Honeypot
☆11Updated 5 years ago
Related projects: ⓘ
- A Passive DNS backend and collector☆31Updated 2 years ago
- Software exploitation training material☆14Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 10 years ago
- ☆68Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 4 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- A Collection of Android Malware☆18Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆35Updated 6 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 2 months ago
- Notes on offensive training☆15Updated 6 years ago
- ☆18Updated 5 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated last year
- ☆33Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆23Updated 3 years ago
- Python implementation of the SlowLoris DoS attack.☆22Updated 7 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆11Updated 4 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆9Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Malicious Software SRC Extract☆28Updated last year
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Malicious traffic detection system☆11Updated last year