maxamin / The-Awesome-And-Dangerous-collectionLinks
A high-risk archive of historical malware, exploit kits, crypters, and webshells for educational and cybersecurity research purposes. None of this code is authored by the repository owner, and no responsibility is taken for misuse,π Intended Audience: Cybersecurity researchers, malware analysts...
β67Updated 5 months ago
Alternatives and similar repositories for The-Awesome-And-Dangerous-collection
Users that are interested in The-Awesome-And-Dangerous-collection are comparing it to the libraries listed below
Sorting:
- Hacking Methodology, Cheatsheats, Conceptual-Breakdownsβ72Updated last month
- Simple Malware Scanner written in pythonβ92Updated 2 months ago
- Windows Hacking FrameWork using Reverse Shellβ106Updated 4 months ago
- Custom pentesting toolsβ25Updated 4 years ago
- Extendable Python script handler for automating penetration testing.β39Updated 2 years ago
- A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLβ¦β82Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalwareβ54Updated 3 years ago
- Enumeration & fingerprint toolβ25Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β39Updated 3 years ago
- Capture screenshots of onion services on an onion service.β49Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmailβ¦β23Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.β53Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β135Updated 3 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware Asβ¦β35Updated 4 years ago
- Repository and archive for Killing The Bear Gitbookβ83Updated last year
- Low Interaction Mobile Honeypotβ94Updated last month
- Collection of extra pentest tools for Kali Linuxβ108Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploiβ¦β81Updated 4 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.β38Updated 8 months ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and nativeβ¦β59Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β104Updated last year
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.β18Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.β107Updated last year
- It was developed to speed up the processes of SOC Analysts during analysisβ49Updated last year
- A multi threaded Python script designed to brute force directories and files names on webservers.β77Updated 3 years ago
- Malware vulnerability intel tool for third-party attackersβ120Updated 8 months ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one toβ¦β60Updated 4 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofingβ88Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound mannerβ32Updated 3 years ago
- List of sources for cybersecurity newsβ36Updated 2 years ago