leetCipher / Malware.development
Malware attacks/techniques explained
☆117Updated 2 weeks ago
Alternatives and similar repositories for Malware.development:
Users that are interested in Malware.development are comparing it to the libraries listed below
- ⚠️ malware development☆508Updated 9 months ago
- Malware Development for Ethical Hackers, published by Packt☆288Updated 3 months ago
- Pure Malware Development Resource Collections☆230Updated 2 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆171Updated last year
- What the name says....☆91Updated 5 months ago
- ☆120Updated 11 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆77Updated last year
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆393Updated last week
- Koth - TryHackMe Tricks☆161Updated last year
- To learn more information about Offensive Security Certified Professional (OSCP)☆38Updated 4 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆153Updated 4 months ago
- CVE-2024-21413 PoC for THM Lab☆76Updated 11 months ago
- Generate FUD backdoors☆243Updated last year
- Scripts for offensive security☆107Updated last month
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆57Updated 5 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆164Updated 8 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆153Updated 7 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆132Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆248Updated last year
- ☆38Updated 3 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆94Updated last year
- ☆19Updated last year
- ☆51Updated 6 months ago
- ☆102Updated 9 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆233Updated 5 months ago
- Knowledge for OSCP☆321Updated 2 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆284Updated last week
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆118Updated 3 years ago
- Official writeups for Hack The Boo CTF 2024☆51Updated 3 months ago