maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β71Updated 8 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ75Updated last week
- Extendable Python script handler for automating penetration testing.β40Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound mannerβ32Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- Collection of extra pentest tools for Kali Linuxβ109Updated last month
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- Elenco di Distro LINUX - WINDOWS - MacOSβ72Updated last year
- Simple Malware Scanner written in pythonβ92Updated 5 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysisβ46Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitaβ¦β53Updated 6 months ago
- Enumeration & fingerprint toolβ24Updated last year
- RedTeam - Red Team Toolsβ47Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β63Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β142Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploiβ¦β81Updated 4 years ago
- Windows Hacking FrameWork using Reverse Shellβ106Updated 7 months ago
- DASH is deep osint Scanner. You just need username to start osint scan.β52Updated 2 years ago
- List of sources for cybersecurity newsβ39Updated 2 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ32Updated 3 years ago
- Full Valid Fake Data Generatorβ101Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTCβ62Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionalsβ36Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β40Updated 3 years ago
- DNSrecon tool with GUI for Kali Linuxβ60Updated 2 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.β47Updated 3 years ago
- Internal Network Penetration Test Playbookβ20Updated 4 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware Asβ¦β36Updated 4 years ago
- Bash script for CTF automating basic enumerationβ43Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive securityβ103Updated last year