JPaulMora / VirusSamples
Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.
☆19Updated 4 years ago
Alternatives and similar repositories for VirusSamples
Users that are interested in VirusSamples are comparing it to the libraries listed below
Sorting:
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Exploit Pack - One step ahead☆11Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- Framework for Making Environmental Keyed Payloads☆13Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Updated 8 years ago
- CTF Writeups☆18Updated 7 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- ☆24Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆29Updated 10 months ago
- AES encrypted python backdoor that communicates AES encrypted data☆9Updated 10 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- MS17-010☆12Updated 7 years ago