moralesaugusto's Stars
vxunderground/MalwareSourceCode
Collection of malware source code for a variety of platforms in an array of different programming languages.
htr-tech/zphisher
An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any misuse of this toolkit !
redcanaryco/atomic-red-team
Small and highly portable detection tests based on MITRE's ATT&CK.
screetsec/TheFatRat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
malwaredllc/byob
An open-source post-exploitation framework for students, researchers and developers.
soapyigu/Swift-30-Projects
30 mini Swift Apps for self-study
nomi-sec/PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
t3l3machus/Villain
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
DavidBuchanan314/tweetable-polyglot-png
Pack up to 3MB of data into a tweetable PNG polyglot file.
ShadowCorpIndustries/SpotLight
THIS PROJECT HAS BEEN DELETED
AmnestyTech/investigations
Indicators from Amnesty International's investigations
t3l3machus/psudohash
Generates millions of keyword-based password mutations in seconds.
the-full-stack/course-gitbook
Full Stack Deep Learning Online Course
NHAS/reverse_ssh
SSH based reverse shell
khanhnamle1994/technical-interview-prep
These are coding solutions for problems I study while preparing for technical interviews at tech companies
georgesotiriadis/Chimera
Automated DLL Sideloading Tool With EDR Evasion Capabilities
Casualtek/Ransomchats
CheckPointSW/Evasions
Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into categories for ease of searching and understanding. Also provided are code samples, signature recommendations and countermeasures within each category for the described techniques.
3xp0rt/LockBit-Black-Builder
deathbybandaid/piholeparser
Pi-Hole Compatible lists
Octoberfest7/DNS_Tunneling
DNS Tunneling using powershell to download and execute a payload. Works in CLM.
izenynn/c-reverse-shell
A reverse shell for Windows and Linux written in C.
649/Crash-iOS-Exploit
Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see the Unicode. Please do not intentionally abuse these exploits.
SeppPenner/Ransomware
Ransomware is a project written in .Net and shows how ransomeware generally works. This repository should be used for educational reasons only!!
p/chrome-extension-cookies-sample
CheckPointSW/reputation-service-api
Leverage the Check Point’s threat intelligence to enrich your SIEM and SOAR solutions and to secure your business applications and websites by using simple RESTful APIs.
UncleJ4ck/MalSys
Malsys is a project designed to validate and analyze files for potential malware signatures.
BadIdeaFactory/biffud-ios-virus
Generic code to wrap a web app in an iOS app.
darkerego/EvilPyKeyvil
Badass Python3 Keylogger With Live WebSocket Stream & HTTP Uploader
juggernaut/muqtti
Zero-dependency MQTTv5 broker in Java