maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β73Updated 11 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ74Updated 2 months ago
- Extendable Python script handler for automating penetration testing.β39Updated 2 years ago
- Windows Hacking FrameWork using Reverse Shellβ107Updated 9 months ago
- Simple Malware Scanner written in pythonβ91Updated 8 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β144Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.β79Updated 3 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its pβ¦β59Updated last year
- Full Valid Fake Data Generatorβ101Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitaβ¦β55Updated this week
- Collection of extra pentest tools for Kali Linuxβ112Updated 3 months ago
- Low Interaction Mobile Honeypotβ96Updated 6 months ago
- β28Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysisβ47Updated last year
- web application pentesting tools for dockerβ17Updated 3 years ago
- Secure destruction of sensitive virtual data, temporary files and swap partitionsβ78Updated 2 years ago
- Simple program to steal private files from removable storagesβ87Updated 3 years ago
- Proof of concept denial of service over TOR stress test toolβ42Updated 7 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β107Updated 2 years ago
- A WLAN red team framework.β155Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.β107Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β40Updated 3 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.β74Updated 4 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ33Updated 3 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender resβ¦β33Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ18Updated 3 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.β52Updated 3 years ago
- β72Updated 2 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing standβ¦β92Updated 3 months ago
- A Hacking and Pentesting Tool for Windowsβ20Updated 5 months ago