There are no reviews yet. Be the first to send feedback to the community and the maintainers!
The-Awesome-And-Dangerous-collection
AD-Mastertools-collection
This is an AD pentest tools collectionconti_locker
conti locker ransomware source code leakLegacy-Botnets-Source-Code-Collection
legacy Botnets source code Forked from github.com/malwaresexploitpack-from-an-APT-infrastructure
exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructureCraxsRat-v6.7-Source-Code
CraxsRat is a sophisticated Android remote access trojan (RAT) that grants cybercriminals extensive control over infected devices. It is developed by the malware-as-a-service operator known as "EVLF DEV" and has been actively used in various cyber-attacks.Zip_slip_poc_creator
RATS-sources
Rats sourcesZombie-Content-management-systems-exploitation-Bot-Source
Zombie Content management systems exploitation Bot Source-0day-Mari-Source
Botnets-sources
Botnets sourcesCrypters-sources
Crypters-sourcesCraxsRat-v6.8-Source-LEAK
CraxsRat is a sophisticated Android remote access trojan (RAT) that grants cybercriminals extensive control over infected devices. It is developed by the malware-as-a-service operator known as "EVLF DEV" and has been actively used in various cyber-attacks.Exploitkits
Unsupervised-Learning-Sequence-Embeddings-via-Sequential-Patterns
latest updateBlacknet
Blacknet sourceBinders-sources
Binders sourcesKeylogger-sources
keyloggers sourcesistic-pfe1
a network supervision system EON with simulated environment for istic graduation projectBaby_Research
Attempt to reverse 0xcheats.net MTA cheatGNS3
Randomx
Randomxmineralternative-kitsune-version-no-autodencoders-are-used
MalwarePack
This repository contains a collection of source code for relatively new malware discovered in the wild.secre
turing-NGFW
NGFW stands for network gateway firewall this is mainly designed for iot and ICS environments the project still in blue printsAdrena-crypter
Adrena Crypter sourceProject-Aurora-Wordlists
tko
Linkedin-Easy-apply-Bot
Our LinkedIn Easy Apply Bot is an intelligent tool designed to automate and streamline the job application process on LinkedIn. By leveraging advanced algorithms and customizable settings, this bot enables job seekers to quickly and efficiently apply to multiple job postings with minimal effort.Projects-for-security-students
This collection is aimed at aspiring cybersecurity professionals and ethical hackers who are eager to delve deeper into offensive security techniques and secure coding practices.-the-Malware-Analysis-Training-Kit
Welcome to the Malware Analysis Training Kit, a comprehensive resource designed to help you understand and analyze malware in .NET and Java environments. This repository includes setup guides, principles, task completion guides, and practical exercises to enhance your malware analysis skills.Hellokitty-Ransomware-Source
HelloKitty ransomware source code repositoryOffensive-SysAdmin-Security-Utilities
Tools and scripts for offensive sysadmin and security tasks, enhancing penetration testing and system administration with a focus on security testing and resilience.maxamin
MagiskOnWSALocal
Babyk-RWSC
This repository contains the source code for Babyk Ransomware, a sophisticated piece of malware designed for educational and research purposes. This project aims to provide security researchers and analysts with a comprehensive understanding of ransomware behavior, encryption techniques, and attack vectors.SMDC4
The Spectrum Management System for Developing Countries (SMS4DC) provides various functionalities for spectrum management activities. Version 5.2 of the software was developed from the contribution of MSIP (Republic of Korea). It contains the revised Article 5 of the Radio Regulations (as per decisions made at WRC-19),WinAPI-Sample-Codes
Windows Api Sample CodesThink_source
A cpp windows API security repopfe_management
Project made under a collaboration for graduation projectMy_resume
phishing-pages-ethical
This repository contains a collection of phishing pages created for educational and ethical hacking purposes. The goal is to help security researchers and professionals understand common phishing techniques and develop better defenses against such attacks.Love Open Source and this site? Check out how you can help us