Jaysmito101 / Malwares
A Repositories of malicious code (ONLY FOR EDUCATIONAL PURPOSE)
☆21Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Malwares
- Cyber security geoip attack map that follows syslog and parses IPs/port numbers to visualize attackers in real time.☆9Updated 4 years ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆12Updated 4 years ago
- Ideaslocas Repository☆37Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- HttpDoom is a tool for response-based inspection of websites across a large amount of hosts for quickly gaining an overview of HTTP-base…☆23Updated 3 years ago
- Script to setup a phishing server on the cloud☆12Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- Repository of tools used in my blog☆49Updated 8 months ago
- A golang tool that uses the dehashed.com API to search for compromised assets.☆8Updated 3 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Handy script to automate the attack☆19Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Emulate the handshake packets of an RDP server with python☆15Updated 6 years ago
- ☆18Updated 3 years ago