Exploitkit
☆188Dec 10, 2016Updated 9 years ago
Alternatives and similar repositories for ExploitKit
Users that are interested in ExploitKit are comparing it to the libraries listed below
Sorting:
- WebShell Dump☆178Dec 10, 2016Updated 9 years ago
- Dangerous Malwares☆215Dec 10, 2016Updated 9 years ago
- Windows Remote-Access-Trojan☆716Dec 28, 2016Updated 9 years ago
- Windows Crypter☆424Dec 28, 2016Updated 9 years ago
- Botnet☆939Feb 8, 2023Updated 3 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- SQLi Tool/SQL Injection/Hijacker☆45Dec 10, 2016Updated 9 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- malwares src dump☆41Mar 3, 2017Updated 8 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 9 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago
- Windows Stealer☆190Dec 10, 2016Updated 9 years ago
- Remote Administration Tool for Windows☆40Mar 30, 2016Updated 9 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 8 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆57Dec 24, 2016Updated 9 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Carberp Banking Trojan☆126Feb 25, 2015Updated 11 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Apr 20, 2017Updated 8 years ago
- Athena Botnet Source Code☆155Sep 25, 2015Updated 10 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆237Dec 6, 2018Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆120Nov 6, 2024Updated last year