maxamin / The-Awesome-And-Dangerous-collectionView external linksLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,🔒 Intended Audience: Cybersecurity researchers, malware analysts...
☆74Jan 25, 2025Updated last year
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- Rats sources☆10Feb 23, 2022Updated 3 years ago
- gitbook of all pentesting knowledge☆21May 1, 2023Updated 2 years ago
- a prompt injection scanner for custom LLM applications☆19Feb 16, 2025Updated last year
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Piso wifi vendo trolling tool☆13Dec 14, 2023Updated 2 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆17Mar 1, 2023Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22May 4, 2024Updated last year
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- ☆18Mar 23, 2023Updated 2 years ago
- Defense from the 2020 Microsoft Evasion Competition☆17Apr 27, 2021Updated 4 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Jul 11, 2022Updated 3 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Feb 24, 2023Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Sources Codes of many MSIL malwares☆24Aug 29, 2022Updated 3 years ago
- ☆12Apr 8, 2022Updated 3 years ago
- Conti Ransomware malware leak WITH LOCKER☆24Mar 5, 2022Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Feb 19, 2021Updated 4 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Command and Control that uses NTP as the transport protocol.☆26Jan 29, 2022Updated 4 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆63Oct 16, 2024Updated last year
- String Encryption and File Encryption for C/C++, C#, Visual Basic .NET, Delphi/Pascal/Object Pascal, Java, JavaScript, Python, Ruby, Auto…☆28Feb 20, 2019Updated 6 years ago
- ☆28Jan 6, 2024Updated 2 years ago
- 🐠 A simple Google query builder for document file discovery☆26Apr 1, 2025Updated 10 months ago
- A library for .NET development with the VersionOne REST API.☆10Apr 14, 2023Updated 2 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆22Oct 9, 2025Updated 4 months ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 2 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- Malware Classification using Machine learning☆76Nov 9, 2024Updated last year
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ secur…☆32Feb 1, 2026Updated 2 weeks ago
- Stay within program scope☆37Aug 17, 2022Updated 3 years ago
- This is Advance Phishing Tool ! OTP PHISHING☆35Jun 27, 2022Updated 3 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 5 months ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- ☆17Mar 22, 2025Updated 10 months ago
- Implementation of a basic trojan horse in Python. Once established the connection between server and client, for the former it's possible…☆15Dec 25, 2020Updated 5 years ago