Monday, June 1, 2020

Malware

Home Malware
Malware

What are the Types of Malware Infecting Your Computer

Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without...

Must Need

Subscraper

Subscraper – Tool That Performs Subdomain Enumeration Through Various Techniques

SubScraper uses DNS brute force, Google & Bing scraping, and Virus Total to enumerate subdomains without an API. Written in Python3, SubScraper performs HTTP(S)...
AutoMacTC : Automated Mac Forensic Triage Collector

AutoMacTC : Automated Mac Forensic Triage Collector

AutoMacTC is a modular forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present them in...
TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the...
Dnssearch : A Subdomain Enumeration Tool

Dnssearch : A Subdomain Enumeration Tool

Dnssearch is a subdomain enumeration tool. It takes an input domain ( -domain parameter ) and a wordlist ( -wordlist parameter ), it will then perform...
CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution

CommandoVM : A Fully Customizable Windows-Based Pentesting Virtual Machine Distribution

Welcome to CommandoVM a fully customizable, Windows-based security distribution for penetration testing and red teaming. Installation
nodeCrypto

nodeCrypto : Ransomware written in NodeJs

nodeCrypto is a Linux Ransomware written in NodeJs that encrypt predefined files. This project was created for educational purposes, you are the...
AhMyth

AhMyth Android Rat – Remote Administration Tool

AhMyth Android RAT is an Android Remote Administration Tool. It consists of two parts : Server side : Desktop application based on electron framework...