amardeep123468 / vxunderground-MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
☆21Updated 5 years ago
Alternatives and similar repositories for vxunderground-MalwareSourceCode
Users that are interested in vxunderground-MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- ☆124Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆141Updated 4 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Updated 10 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆748Updated 3 months ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- PowerShell Ransomware Simulator with C2 Server☆500Updated 3 weeks ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Updated 4 years ago
- A Nmap script optimized for Hack the Box and CTFs☆14Updated 4 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆212Updated 6 months ago
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- https://github.com/BC-SECURITY/Empire☆50Updated 3 years ago
- Just some lists of Malware Configs☆173Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆414Updated last year
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 6 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆309Updated 2 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆272Updated 4 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆320Updated last year
- Generate FUD backdoors☆262Updated 2 years ago
- Warning! This repository contains samples of ransomware.☆94Updated 3 years ago
- ☆50Updated 5 years ago