deeptechlabs / cyberweaponsLinks
Automated Cyber Offense
☆91Updated 6 years ago
Alternatives and similar repositories for cyberweapons
Users that are interested in cyberweapons are comparing it to the libraries listed below
Sorting:
- FUZZBUNCH - NSA security tools☆74Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 6 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- ☆26Updated 8 years ago
- Tinba Banking Trojan☆85Updated 10 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆79Updated 8 years ago
- Malicious Software SRC Extract☆73Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 6 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 7 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆89Updated 9 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆51Updated 6 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Perform MiTM attack and remove encryption on Windows Remote Registry Protocol.☆34Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆85Updated 6 years ago
- HTTP botnet☆61Updated 8 years ago
- ☆65Updated 8 years ago
- malwares src dump☆42Updated 8 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago