Collection of cracked malware
☆15Dec 28, 2018Updated 7 years ago
Alternatives and similar repositories for The-Collection
Users that are interested in The-Collection are comparing it to the libraries listed below
Sorting:
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- zeus-style banking trojan☆14Mar 19, 2017Updated 9 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago
- Simple library to handle PE files loading, relocating, get/set data, ..., in addition to process handling☆32Aug 7, 2019Updated 6 years ago
- Myanmar version of covid19india.org☆14Sep 1, 2020Updated 5 years ago
- My notes about Genyatyk VM crackme☆26Jun 27, 2020Updated 5 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Custom Kali Linux☆22Feb 8, 2014Updated 12 years ago
- ☆22Jun 28, 2016Updated 9 years ago
- Command line text processing with Rust tools☆20May 14, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- Chef repository for pentesting tools☆13Mar 4, 2017Updated 9 years ago
- XtremeRAT SRC Extract☆63Dec 24, 2016Updated 9 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- FLUXION☆10Jun 24, 2016Updated 9 years ago
- all about android reverse engineering☆12Oct 3, 2020Updated 5 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆17Jan 29, 2021Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- ☆35Dec 2, 2018Updated 7 years ago
- Laravel package to convert files and database from zawgyi to unicode.☆15May 29, 2023Updated 2 years ago
- This Script contains tools like assetfinder, amass, httprobe, subjack, nmap, waybackurls and gowitness☆14Mar 31, 2022Updated 3 years ago
- Android audiocapture☆43Jul 6, 2015Updated 10 years ago
- Integration module offering a consistent, simple, and streamlined approach to interacting with the BigFix suite of products and APIs dire…☆11Oct 21, 2021Updated 4 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27May 22, 2019Updated 6 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration☆12Dec 19, 2016Updated 9 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- Source code and tools of the former Mobile-Sandbox☆12Jan 4, 2019Updated 7 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- A demo app in Flutter about saving data to local storage☆15Jan 14, 2019Updated 7 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Nov 18, 2018Updated 7 years ago