leetCipher / Malware.developmentLinks
Malware attacks/techniques explained
☆169Updated this week
Alternatives and similar repositories for Malware.development
Users that are interested in Malware.development are comparing it to the libraries listed below
Sorting:
- Malware Development for Ethical Hackers, published by Packt☆334Updated 6 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆31Updated this week
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆161Updated last month
- ⚠️ malware development☆559Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆187Updated 3 months ago
- What the name says....☆98Updated 9 months ago
- Pure Malware Development Resource Collections☆303Updated 5 months ago
- ☆122Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆90Updated last year
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆29Updated 4 months ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆352Updated last week
- Repo containing cracked red teaming tools.☆178Updated last month
- ☆23Updated last year
- This repo contains my writeups and code from YouTube videos☆39Updated 3 months ago
- This is for Ethical Use only.☆405Updated last month
- capNcook - a dark web exploration tool☆102Updated 8 months ago
- capNcook - a dark web exploration tool☆71Updated last year
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆314Updated last month
- Generate FUD backdoors☆249Updated 2 years ago
- Koth - TryHackMe Tricks☆176Updated last year
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆69Updated 9 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆109Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆191Updated 3 months ago
- Autofill Phishing☆72Updated 6 months ago
- CVE-2024-21413 PoC for THM Lab☆110Updated last year
- Embed a payload inside a PNG file☆323Updated 8 months ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆58Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆243Updated 8 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆444Updated last year