Penetrum-Security / Malware-Zoo
A collection of malware that we use for testing and training
☆12Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Malware-Zoo
- A collection of malware samples caught by DIONAEA Honeypot☆11Updated 5 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆9Updated 2 years ago
- A Collection of Android Malware☆18Updated 5 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- A simple, lightweight Remote Access Tool written in Python☆15Updated 5 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆16Updated last year
- ☆12Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆63Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆20Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Python implementation of the SlowLoris DoS attack.☆22Updated 7 years ago
- ☆14Updated 3 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆13Updated 4 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆12Updated 4 years ago
- This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.☆12Updated 8 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- web application pentesting tools for docker☆17Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago
- Use md5-collisions to make evil executables looking like a good one.☆28Updated 4 years ago
- Standardizing Security Titles☆13Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 2 years ago