leetCipher / Malware.development
Malware attacks/techniques explained
☆104Updated 2 months ago
Alternatives and similar repositories for Malware.development:
Users that are interested in Malware.development are comparing it to the libraries listed below
- ⚠️ malware development☆493Updated 8 months ago
- notes and ramblings from my OSCP/PenTesting Studies☆73Updated last year
- Malware Development for Ethical Hackers, published by Packt☆268Updated 2 months ago
- What the name says....☆89Updated 4 months ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆53Updated 4 months ago
- Scripts for offensive security☆96Updated 2 weeks ago
- ☆120Updated 10 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆167Updated 11 months ago
- CVE-2024-21413 PoC for THM Lab☆67Updated 10 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆88Updated last year
- Knowledge Management for Offensive Security Professionals Official Repository☆133Updated 2 weeks ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆272Updated 3 weeks ago
- Simple CLI program that will fetch and convert a HackTheBox Academy module into a local file in Markdown format.☆38Updated 6 months ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆151Updated 3 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆104Updated last year
- Generate FUD backdoors☆243Updated last year
- This repo offers notes and resources on ethical hacking, covering information gathering, scanning, web hacking, exploitation, and Windows…☆172Updated 3 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆223Updated last year
- Koth - TryHackMe Tricks☆156Updated last year
- Templates for submissions☆61Updated last year
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆114Updated 2 years ago
- ☆383Updated last week
- RansomwareSim is a simulated ransomware☆148Updated 8 months ago
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆387Updated 3 months ago
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆120Updated this week
- A blind SQL injection brute forcer☆106Updated 2 months ago
- From Zero To Hero☆28Updated 4 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆135Updated 6 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆160Updated 7 months ago
- A general purpose cheat sheet for pentesting and OSCP certification☆125Updated 2 weeks ago