amardeep123468 / vxunderground-MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
☆21Updated 5 years ago
Alternatives and similar repositories for vxunderground-MalwareSourceCode
Users that are interested in vxunderground-MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- ☆125Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆118Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆281Updated 9 months ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- PowerShell Ransomware Simulator with C2 Server☆494Updated last year
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- Just some lists of Malware Configs☆173Updated 11 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆208Updated 4 months ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Updated 4 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆744Updated last month
- Generate FUD backdoors☆263Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆410Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- ☆313Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- zerosum0x0's Koadic☆328Updated 3 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆135Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆138Updated 2 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Updated last month
- The Havoc Framework☆61Updated 3 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆318Updated last year
- List Of Ransomware Groups Official WebSites☆121Updated last week
- Cobalt Strike is a post-exploitation framework designed to be extended and customized by the user community. Several excellent tools and …☆391Updated this week
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- ☆247Updated 5 years ago
- C2 server to connect to a victim machine via reverse shell☆52Updated 3 years ago