amardeep123468 / vxunderground-MalwareSourceCodeLinks
Collection of malware source code for a variety of platforms in an array of different programming languages.
☆21Updated 5 years ago
Alternatives and similar repositories for vxunderground-MalwareSourceCode
Users that are interested in vxunderground-MalwareSourceCode are comparing it to the libraries listed below
Sorting:
- ☆125Updated last year
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆119Updated 2 years ago
- https://github.com/BC-SECURITY/Empire☆50Updated 3 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Updated 11 months ago
- For pentesters who don't wanna leave their terminals.☆183Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- Generate FUD backdoors☆262Updated 2 years ago
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 6 years ago
- Fork from @rsmudge/armitage☆140Updated 3 years ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆749Updated 3 months ago
- Just some lists of Malware Configs☆173Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆83Updated 3 years ago
- PowerShell Ransomware Simulator with C2 Server☆500Updated last month
- C2 server to connect to a victim machine via reverse shell☆55Updated 3 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆141Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Updated last year
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆238Updated last year
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆321Updated last year
- ☆325Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆415Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- necromantic session control☆179Updated last month
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago