Python RansomwarePython Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Stars: ✭ 96 (-27.27%)
RichkwareFramework for building Windows malware, written in C++
Stars: ✭ 315 (+138.64%)
HerculesHERCULES is a special payload generator that can bypass antivirus softwares.
Stars: ✭ 526 (+298.48%)
Telegram RatWindows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (+52.27%)
Ghost👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+136.36%)
DiamorphineLKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+449.24%)
ThefatratThefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+4403.03%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-8.33%)
NetwormPython network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (+2.27%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+4265.91%)
ThreadBoatProgram Uses Thread Execution Hijacking To Inject Native Shell-code Into a Standard Win32 Application
Stars: ✭ 162 (+22.73%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+8586.36%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+6703.79%)
Spytrojan keylogger[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-75.76%)
HacktheworldAn Python Script For Generating Payloads that Bypasses All Antivirus so far .
Stars: ✭ 527 (+299.24%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (+21.97%)
Awesome HackingAwesome hacking is an awesome collection of hacking tools.
Stars: ✭ 1,802 (+1265.15%)
Goat🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (+65.15%)
Xeexe TopantivirusevasionUndetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+193.18%)
Dr0p1t FrameworkA framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+757.58%)
Inferno🔥 Modern command line tool for malware creation on Windows
Stars: ✭ 105 (-20.45%)
M3m0M3m0 Tool ⚔️ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 124 (-6.06%)
Mitmap📡 A python program to create a fake AP and sniff data.
Stars: ✭ 1,526 (+1056.06%)
FlashmingoAutomatic analysis of SWF files based on some heuristics. Extensible via plugins.
Stars: ✭ 115 (-12.88%)
Awesome Mobile SecurityAn effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1291.67%)
EviltwinframeworkA framework for pentesters that facilitates evil twin attacks as well as exploiting other wifi vulnerabilities
Stars: ✭ 122 (-7.58%)
Burp Send ToAdds a customizable "Send to..."-context-menu to your BurpSuite.
Stars: ✭ 114 (-13.64%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (-5.3%)
Scilla🏴☠️ Information Gathering tool 🏴☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-12.12%)
DnstrickerA simple dns resolver of dns-record and web-record log server for pentesting
Stars: ✭ 128 (-3.03%)
BlockLet's make an annoyance free, better open internet, altogether!
Stars: ✭ 1,849 (+1300.76%)
Linux Smart EnumerationLinux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+1381.82%)
TelekillerA Tools Session Hijacking And Stealer Local Passcode Telegram Windows
Stars: ✭ 122 (-7.58%)
BrutemapLet's find someone's account
Stars: ✭ 113 (-14.39%)
VirtualsecconsAn ongoing list of virtual cybersecurity conferences.
Stars: ✭ 113 (-14.39%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-4.55%)
Flux Keylogger🔖 Modern Javascript keylogger with web panel
Stars: ✭ 122 (-7.58%)
Green Hat SuiteGreen-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Stars: ✭ 112 (-15.15%)
TweetshellMulti-thread Twitter BruteForcer in Shell Script
Stars: ✭ 112 (-15.15%)
CtfrAbusing Certificate Transparency logs for getting HTTPS websites subdomains.
Stars: ✭ 1,535 (+1062.88%)
Malconfscan With CuckooCuckoo Sandbox plugin for extracts configuration data of known malware
Stars: ✭ 110 (-16.67%)
PracticalmalwarelabsKeep track of the labs from the book "Practical Malware Analysis"
Stars: ✭ 130 (-1.52%)
Evil WinrmThe ultimate WinRM shell for hacking/pentesting
Stars: ✭ 2,251 (+1605.3%)
Mass RatBasic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-3.79%)
GofingerprintGoFingerprint is a Go tool for taking a list of target web servers and matching their HTTP responses against a user defined list of fingerprints.
Stars: ✭ 120 (-9.09%)
Lime Minera simple hidden silent XMR miner.
Stars: ✭ 109 (-17.42%)
GoaltdnsA permutation generation tool written in golang
Stars: ✭ 119 (-9.85%)
FawkesFawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine.
Stars: ✭ 108 (-18.18%)
Awesome Malware💻⚠️ A curated collection of awesome malware, botnets, and other post-exploitation tools.
Stars: ✭ 108 (-18.18%)
DeathransomA ransomware developed in python, with bypass technics, for educational purposes.
Stars: ✭ 126 (-4.55%)
Shodan DorksDorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-10.61%)
PossumbotA bot that will allow you to destroy discord servers.
Stars: ✭ 106 (-19.7%)
ProdigymathgamehackingProdigy Hacking Organization: Hacking for the right reasons. | Questions? Ask on our Discord. https://discord.gg/XQDfbfq
Stars: ✭ 108 (-18.18%)
SocialpwnedSocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-21.21%)