A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,🔒 Intended Audience: Cybersecurity researchers, malware analysts...
☆77Jan 25, 2025Updated last year
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rats sources☆10Feb 23, 2022Updated 4 years ago
- conti locker ransomware source code leak☆30Mar 5, 2022Updated 4 years ago
- gitbook of all pentesting knowledge☆21May 1, 2023Updated 2 years ago
- A repo with a listing of binary ninja scripts + plugins (massively inspired by https://github.com/onethawt/idaplugins-list)☆18Feb 19, 2017Updated 9 years ago
- datafun brings the fun back to data pipelines☆12Dec 1, 2025Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Learning Coccinelle☆11Nov 2, 2017Updated 8 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆17Jul 16, 2024Updated last year
- Recon Automation☆11Sep 14, 2024Updated last year
- [WIP(造轮子中)]「海纳百川」1个分布式的 IM server☆11Sep 24, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- ☆18Mar 23, 2023Updated 3 years ago
- Common Errors,self-written scripts related to information security,CTF challenges,steganography,forensics,web,crypto or OSINT and more☆14Nov 10, 2025Updated 5 months ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Containing vulnerabilities I've discovered and maybe CVE☆19Apr 14, 2023Updated 2 years ago
- Quick Repo for any Bug Hunter☆15May 19, 2021Updated 4 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- ☆16Dec 13, 2025Updated 3 months ago
- Collection of F-Droid repositories☆17Nov 23, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 3 years ago
- ☆12Oct 1, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Python logging integration with Google Cloud Stackdriver API.☆13Oct 1, 2020Updated 5 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Gain root privilege by exploiting CVE-2014-3153 vulnerability☆16Sep 27, 2018Updated 7 years ago
- ☆14Aug 13, 2021Updated 4 years ago
- ☆10Oct 8, 2018Updated 7 years ago
- Deep Packet Inspection • Traffic Forensics • Network Threat Detection☆52Feb 20, 2026Updated last month
- XDROID is android all in one hack tools☆38Jul 30, 2025Updated 8 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Oct 28, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 6 months ago
- 自动完成B站每日任务☆18Sep 14, 2021Updated 4 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Oct 16, 2024Updated last year
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆42Feb 1, 2026Updated 2 months ago
- This is an AD pentest tools collection☆59Jul 6, 2024Updated last year