Optixal / MalwarePoC
Proof-of-concept malware programs. For educational purpose only.
☆23Updated 8 years ago
Alternatives and similar repositories for MalwarePoC:
Users that are interested in MalwarePoC are comparing it to the libraries listed below
- Here comes the paintrain!☆11Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆24Updated 4 years ago
- See here:☆42Updated 12 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Gmail Knocker☆21Updated 7 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- collection of useful shells for penetration tests☆36Updated 7 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Clone of Metasploit's wiki w/ additions☆15Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆10Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- ☆17Updated 10 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆37Updated 4 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago