leetCipher / Malware.developmentLinks
Malware attacks/techniques explained
☆196Updated 5 months ago
Alternatives and similar repositories for Malware.development
Users that are interested in Malware.development are comparing it to the libraries listed below
Sorting:
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆166Updated 7 months ago
- ⚠️ malware development☆654Updated last year
- Malware Development for Ethical Hackers, published by Packt☆420Updated last week
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆414Updated this week
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆208Updated 5 months ago
- Pure Malware Development Resource Collections☆410Updated 11 months ago
- ☆125Updated last year
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆468Updated 10 months ago
- Embed a payload inside a PNG file☆360Updated last year
- What the name says....☆104Updated last year
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆56Updated 7 months ago
- Phishing with a fake reCAPTCHA☆628Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆34Updated 2 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated last year
- The LockBit builder files☆142Updated last year
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆670Updated last year
- Autofill Phishing☆85Updated 4 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆493Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆38Updated last year
- Small collection of Ransomware organized by family.☆264Updated last year
- CVE-2024-21413 PoC for THM Lab☆185Updated last year
- PasteBomb C2-less RAT☆319Updated 2 months ago
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆444Updated 7 months ago
- Marlowe Malwares is a comprehensive repository dedicated to the aggregation, analysis, and management of malware samples written in vario…☆37Updated 10 months ago
- The easiest way to achieve a reverse shell bypassing Windows Defender. Windows Evasion | Windows Defender Evasion | Windows Defender Bypa…☆46Updated last month
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆83Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆187Updated last year
- Repo containing cracked red teaming tools.☆214Updated last month
- ☆188Updated 2 months ago