leetCipher / Malware.developmentLinks
Malware attacks/techniques explained
☆178Updated last month
Alternatives and similar repositories for Malware.development
Users that are interested in Malware.development are comparing it to the libraries listed below
Sorting:
- ⚠️ malware development☆583Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆163Updated 2 months ago
- Malware Development for Ethical Hackers, published by Packt☆351Updated 8 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆192Updated 2 weeks ago
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆365Updated this week
- Pure Malware Development Resource Collections☆336Updated 7 months ago
- ☆123Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆36Updated last year
- What the name says....☆101Updated 10 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆459Updated last year
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆644Updated last year
- CTF Helper is a powerful, modular Command Line Interface (CLI) tool designed for Capture The Flag (CTF) competitions and cybersecurity ta…☆32Updated last month
- notes and ramblings from my OSCP/PenTesting Studies☆92Updated last year
- PasteBomb C2-less RAT☆320Updated 8 months ago
- Small collection of Ransomware organized by family.☆239Updated 10 months ago
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆437Updated 5 months ago
- This repo contains my writeups and code from YouTube videos☆41Updated 4 months ago
- Matkap - hunt down malicious Telegram bots☆684Updated 2 weeks ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- Koth - TryHackMe Tricks☆178Updated last year
- Repo containing cracked red teaming tools.☆187Updated 2 months ago
- Phishing with a fake reCAPTCHA☆587Updated 10 months ago
- The LockBit builder files☆125Updated last year
- Embed a payload inside a PNG file☆334Updated 9 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆310Updated last year
- Autofill Phishing☆74Updated 7 months ago
- CVE-2024-21413 PoC for THM Lab☆127Updated last year
- POC | Steal user WhatsApp information/data☆71Updated 2 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆155Updated 2 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆112Updated last year