SKocur / Malware-CollectionLinks
Source codes of malwares, stress tests etc. for computer.
☆37Updated 5 years ago
Alternatives and similar repositories for Malware-Collection
Users that are interested in Malware-Collection are comparing it to the libraries listed below
Sorting:
- My public exploit collection.☆32Updated 6 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Simple Live Data Collection Tool☆21Updated 4 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- only for 31337☆23Updated 8 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 6 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Pentest ToolKit☆28Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- ☆15Updated 2 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running on…☆29Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆29Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 4 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Random stuff☆16Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago