maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β73Updated 10 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Windows Hacking FrameWork using Reverse Shellβ108Updated 8 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β141Updated 3 years ago
- Simple Malware Scanner written in pythonβ91Updated 6 months ago
- Sifter - All purpose penetration testing op-centerβ81Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β64Updated 3 years ago
- Collection of extra pentest tools for Kali Linuxβ111Updated 2 months ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ76Updated last month
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ18Updated 3 years ago
- β28Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.β40Updated last year
- legacy Botnets source code Forked from github.com/malwaresβ26Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTCβ65Updated 2 years ago
- Extendable Python script handler for automating penetration testing.β40Updated 2 years ago
- This will encrypt π€ your files using AES-256-CTR, then RSA-4096π΅βπ«to secure the exchange with the server, or can use the Tor SOCKS5 Prβ¦β80Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.β51Updated 3 years ago
- A tool designed to analyse email headersβ39Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSecβ64Updated 4 years ago
- Enumeration & fingerprint toolβ24Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its pβ¦β59Updated last year
- Simple program to steal private files from removable storagesβ87Updated 3 years ago
- A Hacking and Pentesting Tool for Windowsβ19Updated 4 months ago
- web application pentesting tools for dockerβ18Updated 3 years ago
- Bash script for CTF automating basic enumerationβ43Updated 3 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotalβ78Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionalsβ36Updated last year
- steal chrome saved passwords "undetectable"β51Updated 3 years ago
- β125Updated last year