leetCipher / Malware.development
Malware attacks/techniques explained
☆81Updated 5 months ago
Related projects: ⓘ
- Malware Development for Ethical Hackers, published by Packt☆120Updated last month
- notes and ramblings from my OSCP/PenTesting Studies☆66Updated 10 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆147Updated 6 months ago
- ⚠️ malware development☆341Updated 3 months ago
- ☆53Updated 4 months ago
- 🐲 catppuccin kali rice☆26Updated 5 months ago
- ☆112Updated 6 months ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆42Updated last month
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆340Updated 2 weeks ago
- ☆30Updated 10 months ago
- Here are all the notes I personally took while studying for the OSCP which helped me pass.☆68Updated 2 years ago
- Projects for security students and professionals☆126Updated 2 months ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆72Updated last month
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆165Updated 7 months ago
- Writeups for the Hack The Box Cyber Apocalypse 2023 CTF contest☆31Updated last year
- capNcook - a dark web exploration tool☆66Updated 8 months ago
- A spy pixel which can be emedded into web pages or emails.☆80Updated last month
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆204Updated 8 months ago
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆177Updated last year
- Koth - TryHackMe Tricks☆138Updated 10 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆134Updated 3 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆76Updated 7 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆36Updated last month
- custom-echo for koth tryhackme, holmes is such a homie <3☆15Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆98Updated last month
- Learning progress in CyberTalents Blue Team Scholarship 2023. Write-ups, solutions, and notes for challenges & topics. Join my cybersecur…☆24Updated 11 months ago
- A general purpose cheat sheet for pentesting and OSCP certification☆107Updated 5 months ago
- Write-ups and walkthroughs for Hack The Box machines☆29Updated 2 weeks ago
- All Solutions☆84Updated 4 months ago
- Knowledge needed to obtain the OSCP certification☆169Updated 2 months ago