VenomControl Rat is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection
-
Updated
Jul 16, 2024 - C#
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
VenomControl Rat is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection
AsyncRAT stands as a Remote Access Tool (RAT) conceived for the purpose of distant supervision and command over remote computers through an encrypted connection ensuring security.
Cron caching of https://iplists.firehol.org (without private networks a.k.a RFC1918)
BitRAT CrackedIt is meticulously constructed utilizing the C++ programming language. It stands as the most recent iteration of the premier PC RAT for the year 2023. Regarded as a prized tool
The RunPE program is written in C# to execute a specific executable file within another files memory using the ProcessHollowing technique.
The PyMalwareOS project is a collection of simple malwares created with Python. It includes remote access via SSH and ransomware with asymmetric encryption using Fernet for Windows systems and Linux Systems
Computing) capabilities. It boasts compatibility with a spectrum of 20 concealed browsers. Pegasus HVNC facet facilitates the orchestration of a concealed desktop environment
Aggregated AbuseIPDB blocklists with worst IPv4 & IPv6 offenders (~100% confidence)
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Zeek-Formatted Threat Intelligence Feeds
Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
🔒 Consolidating and extending hosts files from several well-curated sources.
Volatility 3.0 development
oisd blocklist