carlospolop / MalwareWorldLinks
System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts
☆150Updated 3 years ago
Alternatives and similar repositories for MalwareWorld
Users that are interested in MalwareWorld are comparing it to the libraries listed below
Sorting:
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- A WLAN red team framework.☆156Updated last year
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆19Updated 4 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆76Updated 3 years ago
- scylla.sh db dumps and more☆139Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Pivoting Frontend for Pre-Seeded Password Databases☆132Updated last month
- Perform automated network reconnaissance scans☆234Updated 2 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Maintained list of OSINT resources specifically for researching domains and IoT products.☆69Updated 3 years ago
- recon-ng modules for Censys☆38Updated last year
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆97Updated 4 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆81Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- URL fingerprinting made easy☆89Updated last year
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆83Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Low Interaction Mobile Honeypot☆95Updated 3 months ago