Clone of svn repository of http://insecurety.net/projects/web-malware/ project
☆466Oct 18, 2016Updated 9 years ago
Alternatives and similar repositories for web-malware-collection
Users that are interested in web-malware-collection are comparing it to the libraries listed below
Sorting:
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- ☆228May 17, 2016Updated 9 years ago
- Metasploit AV Evasion Tool☆256Dec 22, 2015Updated 10 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- LNHG - Mass Web Fingerprinter☆63Feb 22, 2016Updated 10 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- malware source codes☆571Dec 16, 2022Updated 3 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Dangerous Malwares☆215Dec 10, 2016Updated 9 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆331Apr 19, 2017Updated 8 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Detect potentially malicious PHP files☆1,477Oct 20, 2023Updated 2 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- BEURK Experimental Unix RootKit☆390Apr 28, 2017Updated 8 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆45Sep 29, 2015Updated 10 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- This is a linux rootkit using many of the techniques described on☆167Oct 22, 2019Updated 6 years ago
- A collection of PHP backdoors. For educational or testing purposes only.☆2,257Mar 9, 2024Updated last year
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- Connection-less Powershell Persistent and Resilient Backdoor☆232Sep 23, 2015Updated 10 years ago
- application server attack toolkit☆688Apr 6, 2020Updated 5 years ago
- An IRC based tool for testing the capabilities of a botnet.☆143Jun 30, 2020Updated 5 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- a package of Pentest scripts I have made or commonly use☆628Nov 21, 2025Updated 3 months ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago