leetCipher / Malware.developmentLinks
Malware attacks/techniques explained
☆191Updated 3 months ago
Alternatives and similar repositories for Malware.development
Users that are interested in Malware.development are comparing it to the libraries listed below
Sorting:
- ⚠️ malware development☆620Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆202Updated 3 months ago
- Malware Development for Ethical Hackers, published by Packt☆398Updated this week
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆166Updated 5 months ago
- Pure Malware Development Resource Collections☆385Updated 10 months ago
- ☆123Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆390Updated 3 weeks ago
- What the name says....☆101Updated last year
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆481Updated last year
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆660Updated last year
- Small collection of Ransomware organized by family.☆258Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated last month
- PasteBomb C2-less RAT☆318Updated 3 weeks ago
- Embed a payload inside a PNG file☆356Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆113Updated last year
- Phishing with a fake reCAPTCHA☆619Updated last year
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆316Updated last month
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆454Updated 8 months ago
- The LockBit builder files☆138Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆94Updated 2 years ago
- Repo containing cracked red teaming tools.☆196Updated 2 months ago
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆81Updated last year
- This is for Ethical Use only.☆439Updated 5 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆159Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- Autofill Phishing☆80Updated 2 months ago
- CVE-2024-21413 PoC for THM Lab☆163Updated last year
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆41Updated last month
- Demise is Golang malware that uses Discord for communication.☆13Updated last year
- zerosum0x0's Koadic☆318Updated 3 years ago