A collection of offensive tools I've hacked together for CTFs and such
☆20Aug 9, 2016Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- 恶意代码分析学习笔记☆10Dec 29, 2015Updated 10 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- A Go package for encoding and decoding video and audio files.☆15Jul 7, 2021Updated 4 years ago
- Some IR notes☆17Jul 2, 2016Updated 9 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Clash Royale protocol dissector for Wireshark☆15Dec 8, 2016Updated 9 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- A set of vulnerable PHP scripts used to test w3af's vulnerability detection features.☆28Apr 15, 2015Updated 10 years ago
- From telegram bot in command line terminal☆20Oct 15, 2018Updated 7 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Yet another open S3 bucket finder☆20Mar 8, 2018Updated 8 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- view ip accesses to your server on a world map (using geoip and d3.js)☆35Jan 15, 2018Updated 8 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- High-interaction MitM SSH honeypot☆173May 13, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆24Dec 18, 2016Updated 9 years ago
- Telegram Bug Bounty Bot☆32Jan 3, 2017Updated 9 years ago
- Manage project secrets with Keybase encryption within a team☆27Jan 26, 2018Updated 8 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆114May 19, 2023Updated 2 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Sep 1, 2025Updated 6 months ago
- Gallery Hack Form Our Team☆11Aug 10, 2023Updated 2 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 25, 2026Updated last week
- This tool extract domains from IP address based in the information saved in virustotal.☆24Jan 11, 2017Updated 9 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 4 months ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- ☆10Mar 19, 2019Updated 6 years ago
- ☆10Jul 16, 2024Updated last year
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- ☆41Apr 5, 2025Updated 11 months ago
- ☆44Updated this week