maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β73Updated 9 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Windows Hacking FrameWork using Reverse Shellβ106Updated 7 months ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ76Updated 3 weeks ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β141Updated 3 years ago
- β28Updated 3 years ago
- This will encrypt π€ your files using AES-256-CTR, then RSA-4096π΅βπ«to secure the exchange with the server, or can use the Tor SOCKS5 Prβ¦β80Updated last year
- Extendable Python script handler for automating penetration testing.β40Updated 2 years ago
- π CAUTION - Malicious files πβ46Updated last year
- legacy Botnets source code Forked from github.com/malwaresβ26Updated 3 years ago
- Full Valid Fake Data Generatorβ101Updated last year
- A windows post exploitation tool that contains a lot of features for information gathering and more.β47Updated 4 years ago
- steal chrome saved passwords "undetectable"β51Updated 3 years ago
- Collection of extra pentest tools for Kali Linuxβ109Updated last month
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)β33Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- on-the-flyβ85Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- Simple Malware Scanner written in pythonβ91Updated 5 months ago
- Simple program to steal private files from removable storagesβ87Updated 3 years ago
- Koadic C3 COM Command & Control - JScript RATβ45Updated 8 years ago
- A turbo traffic generator pentesting tool to generate random traffic with random MAC and IP addresses in addition to random sequence numbβ¦β157Updated 8 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ18Updated 3 years ago
- web application pentesting tools for dockerβ18Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionalsβ36Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its pβ¦β59Updated last year
- Scripts, POCs & bullshitβ30Updated 5 months ago
- It was developed to speed up the processes of SOC Analysts during analysisβ47Updated last year
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.β40Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β65Updated 4 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.β78Updated 3 years ago