fboldewin / ATMMalScanLinks
☆53Updated 4 years ago
Alternatives and similar repositories for ATMMalScan
Users that are interested in ATMMalScan are comparing it to the libraries listed below
Sorting:
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 5 years ago
- ☆33Updated 10 months ago
- Repository of tools used in my blog☆52Updated last year
- python hash cracker☆52Updated last year
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 2 months ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆39Updated 7 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 6 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆57Updated last year
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- ☆19Updated 8 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 weeks ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- ☆17Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago