maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β70Updated 7 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- Collection of extra pentest tools for Kali Linuxβ109Updated this week
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ75Updated last week
- Windows Hacking FrameWork using Reverse Shellβ107Updated 6 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ18Updated 3 years ago
- β44Updated last year
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.β78Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β17Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β141Updated 3 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.β46Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShellβ53Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender resβ¦β33Updated last year
- Extendable Python script handler for automating penetration testing.β40Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTCβ61Updated 2 years ago
- This project is aimed at freely providing technical guides on various hacking tools.β119Updated last year
- Red Teaming Tactics and Techniquesβ14Updated 3 years ago
- Enumeration & fingerprint toolβ24Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- RedTeam - Red Team Toolsβ47Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLβ¦β82Updated last year
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.β40Updated 11 months ago
- Proof of concept denial of service over TOR stress test toolβ41Updated 7 years ago
- web application pentesting tools for dockerβ18Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionalsβ36Updated last year
- Simple Malware Scanner written in pythonβ92Updated 4 months ago
- C2 server to connect to a victim machine via reverse shellβ53Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.β62Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its pβ¦β59Updated last year