Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+38120%)
InvizzzibleInviZzzible is a tool for assessment of your virtual environments in an easy and reliable way. It contains the most recent and up to date detection and evasion techniques as well as fixes for them.
Stars: ✭ 268 (+793.33%)
Al KhaserPublic malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
Stars: ✭ 3,573 (+11810%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (+316.67%)
MqueryYARA malware query accelerator (web frontend)
Stars: ✭ 264 (+780%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+240%)
SimpleatorSimpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (+766.67%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+303.33%)
TeleShadow2TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (+193.33%)
ScrummageThe Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (+1083.33%)
M-BotnetA C2 project that controls a self-propagating MS17-010 worm.
Stars: ✭ 39 (+30%)
Www.rootkit.comwww.rootkit.com users section mirror, sql database dump, and a few other files/rootkits.
Stars: ✭ 117 (+290%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+203.33%)
Kernel-dll-injectorKernel-Mode Driver that loads a dll into every new created process that loads kernel32.dll module
Stars: ✭ 256 (+753.33%)
carrierwave-attachmentscannerAdds the ability to send CarrierWave uploads to Attachment Scanner for virus and malware prevention.
Stars: ✭ 14 (-53.33%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+5906.67%)
KeyPlexerCapstone: Keylogger Trojan
Stars: ✭ 32 (+6.67%)
VBoxCloakA PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to evade analysis. Guaranteed to bring down your pafish ratings by at least a few points ;)
Stars: ✭ 49 (+63.33%)
Green Hat SuiteGreen-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Stars: ✭ 112 (+273.33%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (+3.33%)
VX-APICollection of various malicious functionality to aid in malware development
Stars: ✭ 904 (+2913.33%)
Lime Minera simple hidden silent XMR miner.
Stars: ✭ 109 (+263.33%)
MalScanA Simple PE File Heuristics Scanners
Stars: ✭ 41 (+36.67%)
ArminC-uBlock-Settings⚙️ ArminC's settings for uBlock₀ - remove most of the ads, pop-ups and trackers.
Stars: ✭ 24 (-20%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (+63.33%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+34343.33%)
fake-sandbox👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.
Stars: ✭ 110 (+266.67%)
rhinoAgile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors
Stars: ✭ 49 (+63.33%)
VitalMalware for Discord, designed to steal passwords, tokens, and inject discord folders for long-term use.
Stars: ✭ 50 (+66.67%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (+250%)
ArsenalExtensible Red Team Framework
Stars: ✭ 99 (+230%)
Dr0pFiUsing this tool, You can capture all WiFi Passwords stored on Windows Computer and mail them to your email account!
Stars: ✭ 38 (+26.67%)
Ai lawall kinds of baseline models for long text classificaiton( text categorization)
Stars: ✭ 243 (+710%)
IlluminatejsIlluminateJS is a static JavaScript deobfuscator
Stars: ✭ 96 (+220%)
maldetectDebian packaging of Linux Malware Detect (https://github.com/rfxn/linux-malware-detect)
Stars: ✭ 48 (+60%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (+503.33%)
ArchivistA ctypes powered python keylogger.
Stars: ✭ 92 (+206.67%)
Tax CalculatorUSA Federal Individual Income and Payroll Tax Microsimulation Model
Stars: ✭ 186 (+520%)
LOLBAS222APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (+233.33%)
InjectallthethingsSeven different DLL injection techniques in one single project.
Stars: ✭ 1,297 (+4223.33%)
malice-avMalice AntiVirus Plugins
Stars: ✭ 98 (+226.67%)
bluepillBluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection (Black Hat Europe 2019, IEEE TIFS 2020)
Stars: ✭ 94 (+213.33%)
MalwoverviewMalwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, ThreatCrowd, Valhalla, Malware Bazaar, ThreatFox and it is able to scan Android devices against VT and HA.
Stars: ✭ 1,276 (+4153.33%)
esajScrapers for many e-SAJ systems
Stars: ✭ 35 (+16.67%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+236.67%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (+83.33%)
maskedkitty🙀 Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files
Stars: ✭ 39 (+30%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (+56.67%)
CypherPythonic ransomware proof of concept.
Stars: ✭ 178 (+493.33%)
MalwaresourcecodeCollection of malware source code for a variety of platforms in an array of different programming languages.
Stars: ✭ 8,666 (+28786.67%)