malvuln / viruscredsLinks
Database of backdoor passwords used by Malware, uncovered by the Malvuln project.
☆26Updated 10 months ago
Alternatives and similar repositories for viruscreds
Users that are interested in viruscreds are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- ☆15Updated 3 years ago
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- ☆16Updated 3 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆20Updated 3 months ago
- ☆24Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 weeks ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆42Updated 4 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- A wrapper around the Proxmark3 client that will alert the user of specific events☆30Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆16Updated 6 months ago
- A Simple Log4j Indicator of Compromise Linux Detector☆15Updated 3 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Updated 3 years ago
- wordlists for password cracking☆28Updated 3 years ago
- ☆80Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 3 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 8 months ago