magisterquis / malwareLinks
A collection of offensive tools I've hacked together for CTFs and such
☆20Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 8 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆65Updated 2 years ago
- an experimental linux kernel module (rootkit) with a keylogger and built-in IRC bot☆57Updated 10 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Drupal Honeypot☆58Updated 6 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆28Updated 9 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Updated 10 years ago
- ☆84Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Admin Panel Finder☆38Updated 3 months ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 11 years ago
- Environmental (and http) keying for scripting languages☆39Updated 7 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- A Custom Scanner for Burp☆31Updated 11 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆41Updated 6 years ago
- DNS Botnet Server and Client☆34Updated 4 months ago