maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β67Updated 6 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ72Updated last month
- Windows Hacking FrameWork using Reverse Shellβ107Updated 4 months ago
- Collection of extra pentest tools for Kali Linuxβ109Updated 2 years ago
- Simple Malware Scanner written in pythonβ92Updated 3 months ago
- Enumeration & fingerprint toolβ24Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β138Updated 3 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- web application pentesting tools for dockerβ18Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β64Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploiβ¦β81Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender resβ¦β31Updated last year
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.β39Updated 9 months ago
- This project is aimed at freely providing technical guides on various hacking tools.β118Updated last year
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscationβ114Updated last year
- A multi threaded Python script designed to brute force directories and files names on webservers.β77Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysisβ49Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β39Updated 3 years ago
- Repository of tools used in my blogβ51Updated last year
- DNSrecon tool with GUI for Kali Linuxβ60Updated 2 years ago
- Automatic reverse/bind shell generator cheat sheet.β34Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLβ¦β82Updated last year
- Full Valid Fake Data Generatorβ100Updated 10 months ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)β32Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShellβ53Updated 2 years ago
- Repository and archive for Killing The Bear Gitbookβ83Updated last year
- Custom pentesting toolsβ25Updated 4 years ago
- Koadic C3 COM Command & Control - JScript RATβ45Updated 8 years ago