A collection of malware that we use for testing and training
☆12Nov 11, 2020Updated 5 years ago
Alternatives and similar repositories for Malware-Zoo
Users that are interested in Malware-Zoo are comparing it to the libraries listed below
Sorting:
- A collection of malware samples caught by DIONAEA Honeypot☆11May 29, 2019Updated 6 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- A Collection of Android Malware☆18Feb 19, 2019Updated 7 years ago
- A WiFi deauthentication tool written in C☆17Sep 20, 2019Updated 6 years ago
- A curated malware database with more then +73000 samples.☆19Feb 20, 2021Updated 5 years ago
- A foreign function interface to use Wireshark within Python☆27Jan 26, 2014Updated 12 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- An experimental server for the CSCG game "Maze"☆26Dec 30, 2020Updated 5 years ago
- Real-time power monitoring solution designed to track the stability of your local electricity grid☆14Aug 8, 2025Updated 6 months ago
- My favorite resources and tools for malware analysis.☆43Aug 18, 2020Updated 5 years ago
- A tool to retrieve malware directly from the source for security researchers.☆39May 10, 2017Updated 8 years ago
- Protection from saycheese.☆10Aug 25, 2021Updated 4 years ago
- Some malware samples or suspicious files I found and their reports.☆38Nov 28, 2021Updated 4 years ago
- Script to Install Sudo Root on Android Termux (ROOT REQUIRED)☆11Aug 18, 2018Updated 7 years ago
- Linux NFTABLES syntax highlighter and syntax checker for Vim-class editors.☆13Aug 23, 2025Updated 6 months ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Mindguard software, by Zapatopi.net Intradimensional☆10Nov 17, 2020Updated 5 years ago
- black Ip lists, dorks-collection☆16Updated this week
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- A collection of malware samples.☆39Dec 5, 2017Updated 8 years ago
- Malware captured with honeypots☆38Oct 2, 2017Updated 8 years ago
- how to set up for run the application on desktop☆13Oct 7, 2021Updated 4 years ago
- Shared BASH Script Libraries https://shlibs.github.io/shlibs.bash/☆12Feb 22, 2022Updated 4 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- ☆12Apr 10, 2019Updated 6 years ago
- Arabic Dictionary for Morphological analysis - python + sqlite☆12Jul 8, 2023Updated 2 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Repository of free educational resources for learning artificial intelligence☆13Jan 24, 2022Updated 4 years ago
- Binary and Static Releases☆16Feb 20, 2026Updated 2 weeks ago
- DEPRECATED: Tool for checking data leaks of social media platforms☆10Feb 20, 2022Updated 4 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated last month
- ☆12Jan 12, 2023Updated 3 years ago
- ☆11Mar 22, 2016Updated 9 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- A Simple Python 3 Reverse Shell Script☆11Dec 24, 2018Updated 7 years ago