carlospolop / MalwareWorldLinks
System based on +500 blacklists to detect internet potencialy malicious hosts
☆152Updated this week
Alternatives and similar repositories for MalwareWorld
Users that are interested in MalwareWorld are comparing it to the libraries listed below
Sorting:
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆19Updated 4 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 8 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆82Updated 3 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 4 years ago
- scylla.sh db dumps and more☆139Updated 2 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- A WLAN red team framework.☆155Updated last year
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Python wrapper for urlscan.io's API☆105Updated 4 years ago
- Unicode encoding attacks with machine learning☆98Updated 4 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆133Updated last week
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- automated password spraying tool☆147Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 4 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆135Updated 3 years ago
- All the tools you need to make your own mind up from the Open Data Sets☆140Updated 3 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Perform automated network reconnaissance scans☆236Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQL…☆81Updated last year
- Your go-to resource for all things OSINT☆180Updated last year
- URL fingerprinting made easy☆90Updated last year