A list of private and public (more or less) blackhat boards
☆278Mar 9, 2019Updated 7 years ago
Alternatives and similar repositories for CrimeBoards
Users that are interested in CrimeBoards are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For all these times you're asking yourself "what is this panel again?"☆262Jan 29, 2026Updated 3 months ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 7 years ago
- Malware exploits☆560Aug 22, 2025Updated 8 months ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 9 years ago
- Collection of cracked malware☆15Dec 28, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Feb 4, 2023Updated 3 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 6 years ago
- Collection of cracked malware, and ebooks☆669Jun 21, 2022Updated 3 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 3 months ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆23Aug 1, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- A tool to spider Github or search URLs for various information leaks☆33May 22, 2023Updated 2 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 7 years ago
- A cloud based remote android managment suite(Botnet), powered by NodeJS☆11Apr 27, 2021Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆59Dec 25, 2021Updated 4 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆316Dec 8, 2022Updated 3 years ago
- Fresh Onions is an open source TOR spider / hidden service onion crawler hosted at zlal32teyptf4tvi.onion☆536Jul 10, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Pastebin OSINT Harvester☆330Apr 27, 2019Updated 7 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆33Aug 7, 2019Updated 6 years ago
- zeus-style banking trojan☆476Jun 26, 2017Updated 8 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆49Jan 10, 2022Updated 4 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆15Jan 19, 2020Updated 6 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- ☆23Dec 15, 2022Updated 3 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A collection of fraud related tools for research.☆150Aug 19, 2019Updated 6 years ago
- executing JS from x86 code☆27May 9, 2019Updated 7 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,463Nov 3, 2018Updated 7 years ago
- Darknet Osint Graph Explorer☆127Oct 7, 2020Updated 5 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Official Black Hat Arsenal Security Tools Repository☆4,279Aug 26, 2024Updated last year