PatrikH0lop / malware_showcase
Understand the nature of malicious software with practical examples in Python.
โ1,955Updated last year
Alternatives and similar repositories for malware_showcase:
Users that are interested in malware_showcase are comparing it to the libraries listed below
- ๐๐ This is a ๐๐ฅ REAL WORLD๐ฅ ๐ Malware Collection I have Compiled & analysed by researchers๐ฅ to understand more about Malware threโฆโ1,025Updated last year
- โ695Updated 2 years ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target rolesโ549Updated 3 weeks ago
- A repository full of malware samples.โ1,140Updated last year
- Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.โ2,254Updated 9 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionalityโฆโ3,890Updated last week
- Codebase to generate an msdt-follina payloadโ1,617Updated 2 years ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.โ3,106Updated last week
- Malware programs written in python, reference from PatrikH0lop/malware_showcaseโ46Updated 2 years ago
- Simple Python SSH Brute Forcing (Credential Stuffing)โ208Updated 2 years ago
- A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jamโฆโ525Updated last month
- โ1,850Updated last year
- Browser In The Browser (BITB) Templatesโ2,789Updated last year
- A Python based RAT ๐ (Remote Access Trojan) for getting reverse shell ๐ฅ๏ธโ767Updated last year
- Powerful framework for rogue access point attack.โ2,047Updated last year
- THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.โ581Updated last year
- Wi-Fi Exploitation Frameworkโ2,455Updated 4 months ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.โ484Updated 2 years ago
- A communal outpouring of online resources for learning different things in cybersecurityโ423Updated 3 years ago
- Create a USB Rubber Ducky like device using a Raspberry PI Picoโ2,556Updated this week