The-Reap-er / The-ScytheLinks
Malware Development Framework
☆10Updated last year
Alternatives and similar repositories for The-Scythe
Users that are interested in The-Scythe are comparing it to the libraries listed below
Sorting:
- Una interfaz para Jekyll que analiza fuentes C++ para producir y aplicar documentación fuera de línea.☆11Updated 11 months ago
- ☆12Updated 2 years ago
- AI modular structure that provides automation-based attack and penetration☆14Updated last year
- Cobalt Strike BOFS☆16Updated last year
- ☆11Updated 4 months ago
- ☆11Updated 3 months ago
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆15Updated 2 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 3 months ago
- Offensive Assembly code snippets.☆12Updated 2 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 10 months ago
- ☆12Updated 3 years ago
- ☆29Updated last year
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- The source code of the DEF CON Red Team Offense Village website☆9Updated 3 months ago
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆16Updated last year
- A simple website to act as a store for havoc modules and extensions☆27Updated 6 months ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- Database for custom made as well as publicly available stage-2 or beacons or stageless payloads, used by loaders/stage-1/stagers, or for …☆10Updated 5 months ago
- All my POC related to malware development☆12Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆10Updated 3 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Just another Process Injection using Process Hollowing technique.☆17Updated last year
- ☆11Updated 7 months ago
- Tool for extracting credentials locally stored by web browsers☆31Updated 3 years ago
- Trojan written in C++ for Windows☆18Updated last year
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆16Updated last month
- Custom mini tools during Red Teaming engagements☆15Updated last month
- ☆16Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago