AnnotationInjectCompile-time Swift dependency injection annotations
Stars: ✭ 40 (-89.69%)
go-malwareGolang Virus Examples
Stars: ✭ 67 (-82.73%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-96.39%)
transportc2PoC Command and Control Server. Interact with clients through a private web interface, add new users for team sharing and more.
Stars: ✭ 22 (-94.33%)
pihole-blocklistsDomain blocklists for Pi-Hole that are free and open for use by everyone.
Stars: ✭ 13 (-96.65%)
BCA-PhantomA multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
Stars: ✭ 80 (-79.38%)
AdunA way to backdoor every process
Stars: ✭ 58 (-85.05%)
flashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 117 (-69.85%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (+166.24%)
WebshellWebshell && Backdoor Collection
Stars: ✭ 1,056 (+172.16%)
JavaRansomwareSimple Ransomware Tool in Pure Java
Stars: ✭ 99 (-74.48%)
ligolo-ngAn advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Stars: ✭ 418 (+7.73%)
SLibSLib is a sandbox evasion library that implements some of the checks from https://evasions.checkpoint.com in C#
Stars: ✭ 50 (-87.11%)
zipcodeZipCode Cep do Brazil
Stars: ✭ 43 (-88.92%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (-88.14%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+1764.43%)
UnpackersMy collection of unpackers for malware packers/crypters
Stars: ✭ 25 (-93.56%)
sarlaccSMTP server / sinkhole for collecting spam
Stars: ✭ 42 (-89.18%)
SilentETHMinerA Silent (Hidden) Ethereum (ETH & ETC) Miner Builder
Stars: ✭ 219 (-43.56%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+74.23%)
nclnuclei framework scripts
Stars: ✭ 25 (-93.56%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+257.22%)
meteorA cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Stars: ✭ 31 (-92.01%)
BackdoorA backdoor that runs on Linux and Windows
Stars: ✭ 36 (-90.72%)
GoPhish-TemplatesGoPhish Templates that I have retired and/or templates I've recreated.
Stars: ✭ 76 (-80.41%)
vesselize⛵ A JavaScript IoC container that works seamlessly with Vue.js and React.
Stars: ✭ 22 (-94.33%)
rejigTurn your VPS into an attack box
Stars: ✭ 33 (-91.49%)
KithackHacking tools pack & backdoors generator.
Stars: ✭ 377 (-2.84%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (-70.36%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-93.81%)
ncPorting Netcat in Node.js. CLI util. 💻
Stars: ✭ 17 (-95.62%)
wingkalabsWingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para realizar entrenamientos de seguridad, probar herramientas de seguridad y practicar técnicas comunes de pruebas de penetración.
Stars: ✭ 16 (-95.88%)
DaggerAutoInjectInject automatically your Activities & Fragments, just with a simple annotation
Stars: ✭ 49 (-87.37%)
ConTroll Remote Access TrojanCreated a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-82.22%)
VNCPwnVNC pentest tool with bruteforce and ducky script execution features
Stars: ✭ 21 (-94.59%)
HackServPython 3 IRC Bot / Botnet
Stars: ✭ 28 (-92.78%)
MSBackdoor[Discontinued] Transform your payload into fake powerpoint (.ppt)
Stars: ✭ 35 (-90.98%)
EzpzShellCollection Of Reverse Shell that can easily generate using Python3
Stars: ✭ 46 (-88.14%)
minipwnerA script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".
Stars: ✭ 53 (-86.34%)
kumasia./kumasia php simple backdoor
Stars: ✭ 13 (-96.65%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-92.53%)
XsshellAn XSS reverse shell framework
Stars: ✭ 251 (-35.31%)
CNeptuneCNeptune improve productivity & efficiency by urbanize .net module with meta-code to lay foundation for frameworks
Stars: ✭ 30 (-92.27%)
yaraMalice Yara Plugin
Stars: ✭ 27 (-93.04%)
leetspeekOpen and collaborative content from leet hackers!
Stars: ✭ 11 (-97.16%)
vxVirus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.
Stars: ✭ 153 (-60.57%)
BackHAckBackdoor Generator | Linux & Windows | FUD AV .py .exe
Stars: ✭ 61 (-84.28%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-93.56%)
Malleable-C2-ProfilesMalleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike & Empire.
Stars: ✭ 168 (-56.7%)
usefuluseful pentest note
Stars: ✭ 59 (-84.79%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+82.73%)