carlospolop / MalwareWorld
System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts
☆144Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for MalwareWorld
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆198Updated 3 years ago
- Uncover the full name of a target on Linkedin.☆155Updated 2 years ago
- A WLAN red team framework.☆142Updated last month
- Visualize networks of phishing by querying the phishstats.info API☆80Updated 3 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆141Updated last year
- Your go-to resource for all things OSINT☆155Updated 7 months ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆182Updated 11 months ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated last year
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆71Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- brute-forcing su for fun and possibly profit☆83Updated 5 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆59Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆126Updated 3 years ago
- Ethical hacking, CTF, tools & etc☆21Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 2 years ago
- A command line tool to search AttackerKB.☆50Updated 3 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆217Updated 3 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆16Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆76Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆117Updated 4 months ago
- Some collected notes about nmap☆108Updated 3 months ago
- A tool designed to hunt for Phishing Kit source code☆215Updated last year
- Wordlists handcrafted (and automated) with ♥☆190Updated 7 months ago
- automated password spraying tool☆147Updated 3 years ago
- Unicode encoding attacks with machine learning☆95Updated 3 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆182Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year