Badusb botnet👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-41.82%)
MaliceVirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+2178.18%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+65.45%)
KeyloggerA powerful C keylogger for Windows.
Stars: ✭ 89 (+61.82%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+1696.36%)
SimpleKeyloggerSimple Keylogger with smtp to send emails on your account using python works on linux and Windows
Stars: ✭ 32 (-41.82%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (+472.73%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-41.82%)
ToxicEye👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (+454.55%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (+90.91%)
SpywarePython-based spyware for Windows that logs the foreground window activites, keyboard inputs. Furthermore it is able to take screenshots and and run shell commands in the background.
Stars: ✭ 31 (-43.64%)
Sinkholes🐛 Malware Sinkhole List in various formats
Stars: ✭ 84 (+52.73%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+36.36%)
Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (+74.55%)
clawSource code of Claw Key logger previously sold on HackForums
Stars: ✭ 33 (-40%)
KeyPlexerCapstone: Keylogger Trojan
Stars: ✭ 32 (-41.82%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (+1105.45%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (+67.27%)
Gobot2Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+683.64%)
MalwareRootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+183.64%)
Pyiris BackdoorPyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+163.64%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+25.45%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (+161.82%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+438.18%)
brute-md5Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3
Stars: ✭ 16 (-70.91%)
EDRHuntScan installed EDRs and AVs on Windows
Stars: ✭ 406 (+638.18%)
urldedupePass in a list of URLs with query strings, get back a unique list of URLs and query string combinations
Stars: ✭ 208 (+278.18%)
acoustic-keyloggerPipeline of a keylogging attack using just an audio signal and unsupervised learning.
Stars: ✭ 80 (+45.45%)
dga-collectionA collection of known Domain Generation Algorithms
Stars: ✭ 61 (+10.91%)
ronin-supportA support library for Ronin. Like activesupport, but for hacking!
Stars: ✭ 23 (-58.18%)
ASPP-2018-numpyMaterial for the Advanced Scientific Programming in Python course on advanced numpy
Stars: ✭ 24 (-56.36%)
matrixmirror of https://mypdns.org/my-privacy-dns/matrix as it is obviously no longer safe to do Girhub nor have we no longer any trust in them. See https://mypdns.org/my-privacy-dns/porn-records/-/issues/1347
Stars: ✭ 32 (-41.82%)
challengesSecurity challenges and CTFs created by the Penultimate team.
Stars: ✭ 13 (-76.36%)
JustEvadeBroJustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.
Stars: ✭ 63 (+14.55%)
pwn-pulseExploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+129.09%)
doraFind exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+316.36%)
pitchThe initial conversation slides and menu of scenarios
Stars: ✭ 37 (-32.73%)
wildpwnunix wildcard attacks
Stars: ✭ 119 (+116.36%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (+69.09%)
Batch-AntivirusBatch Antivirus, a powerful antivirus suite written in batch with real-time protection and heuristical scanning.
Stars: ✭ 26 (-52.73%)
JiraffeOne stop place for exploiting Jira instances in your proximity
Stars: ✭ 157 (+185.45%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+43.64%)
R2A Swift macOS application which turns your keystrokes into music
Stars: ✭ 21 (-61.82%)
KeyloggerA keylogger for Windows, developed as part of the "Build an Advanced Keylogger using C++ for Ethical Hacking!" course on Udemy
Stars: ✭ 16 (-70.91%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (+1.82%)
Defeat-Defender-V1.2Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
Stars: ✭ 885 (+1509.09%)
UnpackersMy collection of unpackers for malware packers/crypters
Stars: ✭ 25 (-54.55%)
Anti-DebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 297 (+440%)
S1EMThis project is a SIEM with SIRP and Threat Intel, all in one.
Stars: ✭ 270 (+390.91%)