Jaysmito101 / MalwaresLinks
A Repositories of malicious code (ONLY FOR EDUCATIONAL PURPOSE)
☆23Updated 4 years ago
Alternatives and similar repositories for Malwares
Users that are interested in Malwares are comparing it to the libraries listed below
Sorting:
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 7 years ago
- Handy script to automate the attack☆22Updated 6 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- recover Firefox and more browsers logins☆48Updated 4 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- A redteam tool to obfuscate IPv4 addresses to evade AV or Application Firewalls☆18Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- python hash cracker☆52Updated last year
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Updated 5 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated last year
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 7 years ago
- ☆18Updated 3 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Updated 4 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last week
- The long shadow to emerge as other Git repositories☆18Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year