misterch0c / malSploitBase
Malware exploits
☆543Updated 5 years ago
Alternatives and similar repositories for malSploitBase:
Users that are interested in malSploitBase are comparing it to the libraries listed below
- Python Decoders for Common Remote Access Trojans☆1,086Updated 9 months ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆438Updated 7 years ago
- malware source codes☆551Updated 2 years ago
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- Exploitkit☆184Updated 8 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆498Updated 5 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆603Updated 3 years ago
- Dangerous Malwares☆204Updated 8 years ago
- EternalRocks worm☆456Updated 7 years ago
- A repository of tools and scripts related to malware analysis☆247Updated 8 years ago
- Pythonic ransomware proof of concept.☆218Updated 4 years ago
- Various snippets created during malware analysis☆459Updated 2 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,409Updated 6 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆611Updated 6 years ago
- ☆223Updated 8 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 8 months ago
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated last year
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆226Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,107Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 8 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated last year
- Python / C# Unmanaged PowerShell based RAT☆779Updated 2 years ago
- Exploits and Security Tools Framework 2.0.1☆306Updated 2 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- SpeedPhishing Framework☆444Updated 5 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago