amardeep123468 / vxunderground-MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
☆21Updated 5 years ago
Alternatives and similar repositories for vxunderground-MalwareSourceCode
Users that are interested in vxunderground-MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- ☆124Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Updated 10 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆747Updated 2 months ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆411Updated last year
- https://github.com/BC-SECURITY/Empire☆50Updated 3 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated last year
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Updated 4 years ago
- PowerShell Ransomware Simulator with C2 Server☆496Updated last week
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆135Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Generate FUD backdoors☆262Updated 2 years ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- Just some lists of Malware Configs☆173Updated last year
- Scripts featured in the book How to Hack Like a Legend☆150Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆317Updated last year
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆553Updated 4 years ago
- ☆196Updated 2 years ago
- Zero Infrastructure Password Cracking☆411Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- A Nmap script optimized for Hack the Box and CTFs☆14Updated 4 years ago
- Assist reverse tcp shells in post-exploration tasks☆219Updated 2 months ago
- Discord C2 for Redteam....Need a better name☆141Updated 2 years ago