A detailed list of potentially dangerous file extensions
☆18Jun 18, 2025Updated 8 months ago
Alternatives and similar repositories for badfiles
Users that are interested in badfiles are comparing it to the libraries listed below
Sorting:
- Cobalt Strike Beacon Object File to to change the user's desktop wallpaper☆17Sep 15, 2023Updated 2 years ago
- Red Team Coin for crypto-mining operations.☆23Jan 12, 2026Updated last month
- Windows Application Attack Surface Analyzer☆24Feb 22, 2024Updated 2 years ago
- AI fun☆27Feb 27, 2025Updated last year
- Tools/scripts I used/developed during the EXP-301 course.☆26May 17, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- A safe place to hide all your precious data at.☆25Feb 27, 2025Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52May 16, 2024Updated last year
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Test bench lab for Shellcode Obfuscation☆35Sep 2, 2025Updated 5 months ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated last month
- This is a ui library for executors☆11Feb 7, 2026Updated 2 weeks ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆42Aug 6, 2024Updated last year
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Roblox esp library☆15Jul 7, 2023Updated 2 years ago
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆10Apr 17, 2021Updated 4 years ago
- ⚒️ Telegram moderation platform with beautifully crafted dashboard. Quick setup with Vercel.☆12Feb 10, 2024Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Aug 3, 2024Updated last year
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Snowy window wallpaper☆16Apr 8, 2023Updated 2 years ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- A terminal based csv editor which is designed to be not a ram hog like standard csv editors, but more useful than other text editors☆16Sep 28, 2024Updated last year
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Download a demo version of Open Network Insight, which can be run standalone on a windows laptop using Winpython https://sourceforge.net/…☆10Feb 1, 2017Updated 9 years ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- The purpose of this learning collection is to provide links to get you started on the journey of AI security.☆10Oct 24, 2025Updated 4 months ago
- ☆12Sep 18, 2015Updated 10 years ago
- ☆10Jun 26, 2024Updated last year
- Dll hijack -- just one macro☆12Jul 3, 2023Updated 2 years ago