fboldewin / ATMMalScanLinks
☆53Updated 4 years ago
Alternatives and similar repositories for ATMMalScan
Users that are interested in ATMMalScan are comparing it to the libraries listed below
Sorting:
- Repository of tools used in my blog☆51Updated last year
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated last month
- Sp00fer blog post -☆25Updated 3 years ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆39Updated 7 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 3 months ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Web App Pen Tester (Web Interface)☆32Updated 2 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- ☆33Updated 9 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆28Updated 7 years ago
- Nexus of Android banking Trojans☆15Updated 2 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- python hash cracker☆52Updated 11 months ago
- gui tool to create normal payload by msfvenom☆34Updated 6 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 7 years ago