A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β79Jan 25, 2025Updated last year
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- legacy Botnets source code Forked from github.com/malwaresβ28Jan 30, 2022Updated 4 years ago
- Auto Web Vulnerability Scanning Frameworkβ10Feb 3, 2016Updated 10 years ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/β¦β19Jul 16, 2024Updated last year
- Recon Automationβ11Sep 14, 2024Updated last year
- Process injection via KernelCallbackTableβ13Jan 28, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- β18Mar 23, 2023Updated 3 years ago
- β20Jul 2, 2024Updated last year
- A Bot that works by scanning all token on BSC Networks, and doing automated trade.β15Feb 26, 2025Updated last year
- The Hall of Ancient Exploitation Toolsβ16Oct 14, 2019Updated 6 years ago
- Piso wifi vendo trolling toolβ15Dec 14, 2023Updated 2 years ago
- β16Sep 23, 2021Updated 4 years ago
- β16May 14, 2026Updated last week
- My experiments in weaponizing Nim (https://nim-lang.org/)β17Mar 1, 2023Updated 3 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"β20Apr 30, 2020Updated 6 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Simple recon tool automates your recon processβ16Apr 15, 2023Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228β13Dec 13, 2021Updated 4 years ago
- β79Apr 28, 2026Updated 3 weeks ago
- Implementation of a basic trojan horse in Python. Once established the connection between server and client, for the former it's possibleβ¦β15Dec 25, 2020Updated 5 years ago
- Scanning and identifying XOR encrypted PE files in PE resourcesβ30Jun 22, 2014Updated 11 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.β23Jul 11, 2022Updated 3 years ago
- Find kernel32 base and API addresses. Simple C++ implementationβ24Apr 7, 2022Updated 4 years ago
- Universal calculator to calculate security codes for Huawei products, to obtain privileged access.β20Apr 17, 2021Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malwareβ32Oct 28, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer β’ AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is Advance Phishing Tool ! OTP PHISHINGβ35Jun 27, 2022Updated 3 years ago
- Exploit code for CVE-2019-17662β18Sep 12, 2021Updated 4 years ago
- routerkill es una script echa en bash que atomatiza varias herramientas para hacer pruebas con MDK3 a un router.β22Oct 14, 2020Updated 5 years ago
- This Tool can help enginners and biggener in network, the tool help you to find of any ip with subnet mask that can calucate them and shoβ¦β14Dec 3, 2021Updated 4 years ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using Aβ¦β31Sep 4, 2025Updated 8 months ago
- Various methods of executing shellcodeβ74Mar 27, 2023Updated 3 years ago
- Like DLPβ11Jan 27, 2025Updated last year
- πAnsible playbooks for Raspberry Pi, Linux and Macβ14Dec 22, 2024Updated last year
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"β23Oct 9, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Responsβ¦β65Oct 16, 2024Updated last year
- Complete and comprehensive course for webmasters from beginner to advancedβ27Apr 14, 2023Updated 3 years ago
- XSS PoCs to elevate your alert()β23May 18, 2023Updated 3 years ago
- β40Jun 5, 2021Updated 4 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablinβ¦β46Feb 24, 2023Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementationβ22Jul 24, 2022Updated 3 years ago
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities β¦β18Jan 29, 2025Updated last year