magisterquis / malwareLinks
A collection of offensive tools I've hacked together for CTFs and such
☆20Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- ☆85Updated 10 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 8 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 11 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- DNS Botnet Server and Client☆34Updated 2 months ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆39Updated 6 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- post-exploitation tools☆15Updated 7 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Drupal Honeypot☆57Updated 6 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Updated 10 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Tools for harvesting email addresses for phishing attacks |☆85Updated 10 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- BurpCSJ extension for Burp Pro - Crawljax Selenium JUnit integration☆34Updated 10 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Updated 6 years ago
- ☆47Updated 9 years ago