maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β75Updated last year
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ74Updated 3 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β143Updated 3 years ago
- Collection of extra pentest tools for Kali Linuxβ113Updated 4 months ago
- Ded Security Framework is a tool aimed at security professionalsβ35Updated last year
- Windows Hacking FrameWork using Reverse Shellβ108Updated 10 months ago
- Simple program to steal private files from removable storagesβ86Updated 3 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.β53Updated 4 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its pβ¦β59Updated last year
- Simple Malware Scanner written in pythonβ91Updated 8 months ago
- Enumeration & fingerprint toolβ24Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β24Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTCβ63Updated 2 years ago
- Extendable Python script handler for automating penetration testing.β39Updated 2 years ago
- web application pentesting tools for dockerβ17Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 3 years ago
- Yet Another PHP Shell - The most complete PHP reverse shellβ82Updated 3 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitionsβ77Updated 3 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLβ¦β81Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.β66Updated 3 years ago
- Bash script for CTF automating basic enumerationβ42Updated 3 years ago
- Proof of concept denial of service over TOR stress test toolβ42Updated 7 years ago
- Full Valid Fake Data Generatorβ101Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ18Updated 3 years ago
- Automatic reverse/bind shell generator cheat sheet.β34Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β69Updated 4 years ago
- A collection of pentesting web scannersβ35Updated last year
- A multi threaded Python script designed to brute force directories and files names on webservers.β79Updated 3 years ago
- RedTeam - Red Team Toolsβ48Updated 3 years ago