PatrikH0lop / malware_showcaseLinks
Understand the nature of malicious software with practical examples in Python.
โ2,198Updated 2 years ago
Alternatives and similar repositories for malware_showcase
Users that are interested in malware_showcase are comparing it to the libraries listed below
Sorting:
- ๐๐ This is a ๐๐ฅ REAL WORLD๐ฅ ๐ Malware Collection I have Compiled & analysed by researchers๐ฅ to understand more about Malware threโฆโ1,150Updated 2 years ago
- A repository full of malware samples.โ1,540Updated 2 years ago
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.โ2,673Updated last year
- โ2,170Updated last year
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEโฆโ2,305Updated last year
- Codebase to generate an msdt-follina payloadโ1,633Updated 3 years ago
- One of a few malware collections on the GitHub.โ2,740Updated 6 months ago
- Organized list of my malware development resourcesโ1,697Updated 3 years ago
- A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.โ518Updated last year
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.โ3,403Updated last year
- Offensive Software Exploitation Courseโ2,396Updated 2 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.comโ1,148Updated 9 months ago
- Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nicknโฆโ12,146Updated 5 months ago
- Projects for security studentsโ2,794Updated 3 months ago
- โ47Updated 5 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityโฆโ4,312Updated 8 months ago
- A collection of malware samples caught by several honeypots i manageโ1,780Updated 4 years ago
- โ2,188Updated 2 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.โ526Updated 3 years ago
- ๐ Lockdoor Framework : A Penetration Testing framework with Cyber Security Resourcesโ1,524Updated 8 months ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 โฆโ1,027Updated 7 months ago
- A workshop about Malware Developmentโ1,756Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooksโ1,078Updated 4 years ago
- Complete Listing and Usage of Tools used for Ethical Hackingโ1,965Updated 2 years ago
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.โ1,039Updated 2 weeks ago
- ๐ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shโ3,593Updated 2 months ago
- A communal outpouring of online resources for learning different things in cybersecurityโ471Updated 4 years ago
- Practical Ethical Hacking Labs ๐ก๐กโ3,287Updated last year
- โ123Updated 3 years ago
- A Collection of Cute But Deadly Virusesโ644Updated last year