carlospolop / MalwareWorldLinks
System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts
☆149Updated 3 years ago
Alternatives and similar repositories for MalwareWorld
Users that are interested in MalwareWorld are comparing it to the libraries listed below
Sorting:
- Visualize networks of phishing by querying the phishstats.info API☆79Updated 11 months ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆77Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆61Updated 4 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆129Updated 4 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆139Updated 2 years ago
- A WLAN red team framework.☆156Updated 9 months ago
- Perform automated network reconnaissance scans☆231Updated 2 years ago
- automated password spraying tool☆147Updated 4 years ago
- brute force SSH public-key authentication☆77Updated last month
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 4 years ago
- Gotanda is browser Web Extension for OSINT.☆193Updated last year
- Custom security distro for remote penetration testing☆53Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- A list of private and public (more or less) blackhat boards☆268Updated 6 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆145Updated 2 years ago
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Your go-to resource for all things OSINT☆178Updated last year
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Enumerate a target Based off of Nmap Results☆78Updated last year
- URL fingerprinting made easy☆87Updated last year
- scylla.sh db dumps and more☆137Updated 4 years ago