Botnet IP Blocklist

A blocklist of botnet IPs, based on the Botnet C2 IOCs of Abuse.ch Feodo Tracker, including online and offline entries. Blocklist is updated twice a day. This blocklist is only useful as a last line of defence after being infected. To avoid infection i...

Asking leaks

Anyone into account selling or raw dumps? if yes dm on telegram @X _TelegramUser

File generated with SQLiteStudio v3.2.1

- - Table: Exploits CREATE TABLE Exploits (Target TEXT , Type TEXT , Criteria TEXT , Method TEXT , Code TEXT , Result TEXT , Notes TEXT ); INSERT INTO Exploits (Target , Type , Criteria , Method , Code , Result , Notes ) VALUES ('Website' , 'Injecti...

Black Course

Course u need to become an Professional Pentester Yeah You will be an Expert Black hat Hacker $! Link: http://uvbpohizz2ez5q2vbegzx4mc4dezc7tdttd6y6tnnk54bv6icwn4ywqd.onion/

Malware Decryptor

A simple Python script for decrypting malware and ransomware import sys import os import struct import optparse from Crypto.Cipher import AES class CorruptFile(Exception): pass class LCG(object): def _ _init _ _(self, seed): self . _seed = (seed & 0x...

RootSec Archive

Overview of RootSec Archive Welcome to the RootSec Archive, your ultimate resource for DDOS tools, scanners, botnets, exploits, and more Our archive includes: Mirai Edits: Private and Public Versions QBot Edits: Private and Public Versions Other Botnet...

Aoyama

Aoyama is for ddos(Maybe add more function later, such as...keylogger? News&Features BOT(V2): Added Port Scanner Improved Code Added Slowloris attack Improved attack process Auto enable ssl when attack Encrypted traffic(xor) Deamon(only linux)(PS: You ...

Wargames

The wargames offered by the OverTheWire community can help you to learn and practice security concepts in the form of fun-filled games. Information about how to connect to each game using SSH, is provided in the top left corner of the page. Keep in min...

ESXiArgs-Recover

ESXiArgs-Recover is a tool to allow organizations to attempt recovery of virtual machines affected by the ESXiArgs ransomware attacks. Usage Download this script and save it as /tmp/recover.sh. For example, with wget: wget -O /tmp/recover.sh https://ra...

crab-crypt

crab-crypt Linux is a ransomware malware that can run on Linux systems. It is a software that finds the victim's user files and encrypts these files and uploads the generated decryption key to the attacker's server. TO-DO LIST - The code block that wil...