magisterquis / malwareLinks
A collection of offensive tools I've hacked together for CTFs and such
☆20Updated 9 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Updated 2 years ago
- Phishing toolkit for red teams and pentesters.☆125Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- ☆86Updated 10 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Updated 10 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago
- DNS Botnet Server and Client☆35Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 9 years ago
- post-exploitation tools☆15Updated 7 years ago
- Drupal Honeypot☆57Updated 6 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆38Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆58Updated 10 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Search Nmap and Metasploit scanning scripts.☆55Updated 7 years ago
- Vulnerability scanner based on vulners.com audit API☆64Updated 7 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago