maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β67Updated 7 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ74Updated this week
- web application pentesting tools for dockerβ18Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLβ¦β82Updated last year
- Windows Hacking FrameWork using Reverse Shellβ108Updated 5 months ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and nativeβ¦β59Updated 2 years ago
- Collection of extra pentest tools for Kali Linuxβ109Updated 2 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.β63Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β64Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Low Interaction Mobile Honeypotβ95Updated 2 months ago
- RedTeam - Red Team Toolsβ47Updated 2 years ago
- on-the-flyβ85Updated last year
- Custom pentesting toolsβ25Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- Miscellaneous tools for BloodHoundβ18Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standβ¦β90Updated last year
- Extendable Python script handler for automating penetration testing.β40Updated 2 years ago
- DNSrecon tool with GUI for Kali Linuxβ60Updated 2 years ago
- Enumeration & fingerprint toolβ24Updated last year
- A multi threaded Python script designed to brute force directories and files names on webservers.β78Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β138Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.β107Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β17Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ18Updated 3 years ago
- Repository of tools used in my blogβ51Updated last year
- Simple Malware Scanner written in pythonβ92Updated 3 months ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound mannerβ32Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one toβ¦β60Updated 4 years ago