leetCipher / Malware.developmentLinks
Malware attacks/techniques explained
☆186Updated 2 months ago
Alternatives and similar repositories for Malware.development
Users that are interested in Malware.development are comparing it to the libraries listed below
Sorting:
- ⚠️ malware development☆608Updated last year
- Malware Development for Ethical Hackers, published by Packt☆374Updated 9 months ago
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆33Updated last week
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆197Updated last month
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆378Updated this week
- Pure Malware Development Resource Collections☆369Updated 8 months ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆165Updated 3 months ago
- What the name says....☆100Updated last year
- Embed a payload inside a PNG file☆347Updated 10 months ago
- ☆123Updated last year
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆441Updated 6 months ago
- PasteBomb C2-less RAT☆318Updated 10 months ago
- Phishing with a fake reCAPTCHA☆607Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- A basic SSH honeypot to capture IP Adresses, usernames, passwords, and commands.☆75Updated 11 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆105Updated last week
- CVE-2024-21413 PoC for THM Lab☆146Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆93Updated last year
- This is for Ethical Use only.☆432Updated 3 months ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆580Updated 2 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆111Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆650Updated last year
- ☆64Updated last year
- The LockBit builder files☆134Updated last year
- Koth - TryHackMe Tricks☆183Updated last year
- Repo containing cracked red teaming tools.☆190Updated last month
- List of payloads: reverse shell, bind shell, webshell.☆49Updated 3 weeks ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆200Updated 6 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆131Updated this week