Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+303.13%)
Mutual labels: hacking, malware, ransomware
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+9255.21%)
Mutual labels: hacking, malware
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1079.17%)
Mutual labels: hacking, malware
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-66.67%)
Mutual labels: hacking, malware
Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-66.67%)
Mutual labels: hacking, infosec
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-35.42%)
Mutual labels: hacking, infosec
Dumpsterfire"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+707.29%)
Mutual labels: hacking, infosec
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-28.12%)
Mutual labels: malware, infosec
BlackwormBlack Worm Offical Repo
Stars: ✭ 80 (-16.67%)
Mutual labels: hacking, ransomware
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+1205.21%)
Mutual labels: malware, infosec
BlocklistsaggregatorA Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-79.17%)
Mutual labels: malware, ransomware
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+929.17%)
Mutual labels: malware, infosec
Malware SamplesA collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+798.96%)
Mutual labels: malware, ransomware
JaelesThe Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1017.71%)
Mutual labels: hacking, infosec
Pentesting toolkit🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Stars: ✭ 1,268 (+1220.83%)
Mutual labels: hacking, infosec
HblockImprove your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+654.17%)
Mutual labels: malware, ransomware
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+655.21%)
Mutual labels: hacking, malware
CloakifyCloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1083.33%)
Mutual labels: hacking, infosec