PatrikH0lop / malware_showcase
Understand the nature of malicious software with practical examples in Python.
☆1,904Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for malware_showcase
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,044Updated 4 months ago
- ☆665Updated 2 years ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆3,806Updated 2 weeks ago
- A repository full of malware samples.☆1,075Updated 10 months ago
- Codebase to generate an msdt-follina payload☆1,614Updated 2 years ago
- A workshop about Malware Development☆1,587Updated last year
- 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware thre…☆991Updated 10 months ago
- Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles☆527Updated 2 months ago
- Organized list of my malware development resources☆1,435Updated 2 years ago
- Create a USB Rubber Ducky like device using a Raspberry PI Pico☆2,413Updated 2 months ago
- ☆2,043Updated last month
- AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.☆947Updated 3 months ago
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆1,906Updated 4 months ago
- Malware programs written in python, reference from PatrikH0lop/malware_showcase☆42Updated 2 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆2,086Updated last year
- Collections of tools and methods created to aid in OSINT collection☆2,834Updated last year
- The Official USB Rubber Ducky Payload Repository☆4,160Updated last week
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆472Updated 2 years ago
- ⚠️ malware development☆462Updated 5 months ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆204Updated last year
- An open-source post-exploitation framework for students, researchers and developers.☆8,989Updated 3 weeks ago
- Mentalist is a graphical tool for custom wordlist generation. It utilizes common human paradigms for constructing passwords and can outpu…☆1,813Updated last year
- Wi-Fi Exploitation Framework☆2,399Updated 2 months ago
- OnionSearch is a script that scrapes urls on different .onion search engines.☆1,282Updated 3 months ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,008Updated last year
- An OSINT tool to search for accounts by username and email in social networks.☆2,863Updated 2 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆9,484Updated 8 months ago
- Whoami provides enhanced privacy, anonymity for Debian and Arch based linux distributions☆1,962Updated last month
- ☆183Updated 2 years ago
- One of a few malware collections on the GitHub.☆2,395Updated 3 months ago