43 Components & Libraries
Sortby
Freki is a free and open-source malware analysis platform. Freki was presented at the XXI Brazilian Symposium on Information and Computational Systems Security (SBSeg 2021). This project is licensed …
Using this tool, You can capture all Saved WiFi Passwords stored on Windows Computer and mail them to your email! Using Dr0pFi, You can capture all WiFi Passwords from a Windows Computer and mail the…
or Or for our MacPorts fans: You come across a new piece of malware called WantToCry. You think back to Wannacry and remember it was stopped because a researcher found a kill-switch in the code. When…
The following diagram shows how ThePhish works at high-level: This example aims to demonstrate how a user can send an email to ThePhish for it to be analyzed and how an analyst can actually analyze t…
⛤Keylogger Generator for Windows written in Python⛤ THIS SOFTWARE IS INTENDED ONLY FOR EDUCATION PURPOSES! DO NOT USE IT TO INFLICT DAMAGE TO ANYONE! USING MY APPLICATION YOU ARE AUTHOMATICALLY AGREE…
Advanced Remote Administration tool for Windows Systems written in pure Python THIS SOFTWARE IS INTENDED ONLY FOR EDUCATION PURPOSES! DO NOT USE IT TO INFLICT DAMAGE TO ANYONE! USING MY APPLICATION Y…
We support multiple deployment models: Use Packj to audit dependencies in pull requests. The quickest way to try/test Packj is using Docker. Podman is also supported for containerized (isolated) runs…
More Python programs will be added to this repository as the book will be constantly improved and enriched. The tools and scripts are:
An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal
Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s Previously the code extracted the home directory of a common user by the HOME environment varia…
This tool is explicitly designed and provided exclusively for educational intentions. Its primary objective is to illuminate the vulnerabilities that files can be susceptible to, highlighting the nee…
Results (ALL, even bad and unfinished ones) of my research on cybersecurity practical cases
Unleash the power of security testing with this Python script! 🐍 Designed for automated vulnerability testing on web applications, it seamlessly integrates with OWASP ZAP (Zed Attack Proxy). This scr…
Subscribe to our newsletter