Database of backdoor passwords used by Malware, uncovered by the Malvuln project.
☆25Jan 19, 2026Updated 3 months ago
Alternatives and similar repositories for viruscreds
Users that are interested in viruscreds are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆121Oct 24, 2024Updated last year
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A set of programs to download, upload, convert, analyze and create a policy for FortiGate firewalls☆15Mar 6, 2025Updated last year
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Aug 31, 2021Updated 4 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- geolocate ip addresses in IIS logs☆20Apr 27, 2026Updated last week
- A multi-server dashboard for Netdata☆19Nov 23, 2022Updated 3 years ago
- Eddie Vetter - triage macOS applications for security research☆16May 24, 2021Updated 4 years ago
- Parses RecentFileCacheParser.bcf files☆30Updated this week
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- Copy a floppy/hard drive from one computer to another via a serial null modem connection☆15Sep 16, 2023Updated 2 years ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago
- Wireless penetration testing framework. Automates WPA/WPA2/WEP/WPS attacks - recon to exploitation in one command. aircrack-ng + hashcat …☆34Apr 10, 2026Updated 3 weeks ago
- ☆11May 30, 2021Updated 4 years ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- GUI for regripper☆11Mar 19, 2019Updated 7 years ago
- Custom firmware for the HackRF+PortaPack H1/H2☆10Apr 28, 2026Updated last week
- wordpress batch brute force☆11Sep 21, 2021Updated 4 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆21May 23, 2022Updated 3 years ago
- Find Flight & Marine OSINT resources,☆25Apr 5, 2026Updated last month
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- Network captures for examples in Windows protocols overview documents☆15Jun 12, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Simple unpacking script for Ezuri ELF Crypter☆37Jul 28, 2021Updated 4 years ago
- Mount VSCs with ease!☆18Apr 28, 2026Updated last week
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated last year