magisterquis / malwareView external linksLinks
A collection of offensive tools I've hacked together for CTFs and such
☆20Aug 9, 2016Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- A Go package for encoding and decoding video and audio files.☆15Jul 7, 2021Updated 4 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- Clash Royale protocol dissector for Wireshark☆15Dec 8, 2016Updated 9 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 8 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- From telegram bot in command line terminal☆20Oct 15, 2018Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- A tiny cross-platform Go library to hide/unhide files and directories☆24Jan 29, 2022Updated 4 years ago
- Yet another open S3 bucket finder☆20Mar 8, 2018Updated 7 years ago
- Update Go programs from the internet☆23Apr 24, 2025Updated 9 months ago
- Low-interaction VNC honeypot with a static challenge.☆23Aug 10, 2019Updated 6 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- view ip accesses to your server on a world map (using geoip and d3.js)☆34Jan 15, 2018Updated 8 years ago
- High-interaction MitM SSH honeypot☆172May 13, 2018Updated 7 years ago
- Telegram Bug Bounty Bot☆32Jan 3, 2017Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆24Dec 18, 2016Updated 9 years ago
- Manage project secrets with Keybase encryption within a team☆27Jan 26, 2018Updated 8 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112May 19, 2023Updated 2 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Sep 1, 2025Updated 5 months ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 3, 2026Updated last week
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- This is a list of Computer and Network Security Axioms☆30May 1, 2020Updated 5 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Mitre chopshop network decoder framework☆30Oct 13, 2025Updated 4 months ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- ☆10Jul 16, 2024Updated last year
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- ☆10Mar 19, 2019Updated 6 years ago
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 4 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago