maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β65Updated 5 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β134Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated 11 months ago
- β44Updated 11 months ago
- Collection of extra pentest tools for Kali Linuxβ107Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β86Updated 11 months ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β103Updated last year
- Bash script for CTF automating basic enumerationβ44Updated 3 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ22Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ72Updated last week
- Capture screenshots of onion services on an onion service.β49Updated last year
- Enumeration & fingerprint toolβ25Updated last year
- β24Updated 4 months ago
- Crawls URL to get a better image of what is tied to a website.β33Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.β109Updated 6 months ago
- It was developed to speed up the processes of SOC Analysts during analysisβ49Updated last year
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports oβ¦β81Updated 4 years ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your carβ¦β33Updated 3 weeks ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without lockiβ¦β36Updated 3 weeks ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 3 years ago
- Tactics, Techniques, and Proceduresβ25Updated 5 months ago
- Web Hacking and Red Teaming MindMapβ74Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploiβ¦β81Updated 4 years ago
- Pentest/Red Team: Resources, repos and scripts.β69Updated 2 weeks ago
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- Multithread reverse shell listenerβ25Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversionsβ68Updated 2 months ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...β110Updated last year
- web application pentesting tools for dockerβ18Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.β51Updated 2 years ago