cysec-cover

69 Cybersecurity Tools

Welcome to my repository of cybersecurity tools. Here you will find about 69 programs designed to evaluate and improve the security of computer systems.


Why Share This?


Because there it is evident growing concerns about apps that can compromise personal or financial data, and as communities increasingly digitize into organizations managing critical information, cybersecurity awareness is crucial.

This collection reveals the sophisticated types of cyber attacks typically conducted by experts to recover data or regain control of systems. In necessary circunstances, are meant for passive or active defense.

I've opened this repo made by months of work to support further research in this field as a humble passionate coder based in Buenos Aires, Argentina. So, if you appreciate this content, you can stay updated via my nostr or just message me directly.

Thanks for your time.

WARNING: Misuse of these tools may have serious legal consequences. Is strongly recommended to educate yourself on cybersecurity and ethical hacking before using them. Here are certified recommended courses.

NameDescription
A tool to convert executable files to Word documents, often used in exploit scenarios.
A crypter used to encrypt and obfuscate malware to avoid detection by antivirus software.
A Remote Access Trojan (RAT) that allows attackers to control a target machine remotely.
A builder for creating ransomware, allowing the attacker to encrypt victim's files for ransom.
A popular platform for web application security testing.
A tool for creating custom ransomware, version 4.
A remote access tool used for controlling a target machine remotely, version 4.9.3.
Tools and scripts designed for Distributed Denial of Service (DDoS) attacks.
A crypter for encrypting malicious code to evade detection.
A tool to analyze and identify executable files.
A tool for creating HTML Application (HTA) exploits.
A Fully Undetectable (FUD) crypter to obfuscate malware.
A binder tool for combining multiple files into a single executable.
Tools for collecting and analyzing logs.
A web testing suite used for scraping, brute force attacks, and checking credentials.
A powerful remote access tool for spying on target devices.
A stealer malware that extracts sensitive information from target systems.
A tool to convert images to icon files, often exploited for malicious purposes.
A Remote Access Trojan for controlling target machines.
A RAT used to spy on Android devices.
A RAT with hidden VNC capabilities, allowing for hidden remote desktop sessions.
A crypter for obfuscating APK files to avoid detection.
A version of the 888 RAT for remote access and control.
Setup and tutorial for Anubis, a well-known Android RAT.
A tool for automated Google dorking to find vulnerable web pages.
A RAT targeting Android devices.
A cracked version of BurpBountyPro for extending Burp Suite capabilities.
A tool for creating custom ransomware, version 5.
CraxsRat-V3 2023 is a remote access tool (RAT) designed for controlling and managing targeted computer systems remotely.
A crypter for encrypting Android APK files.
Tools for hacking and gaining access to WiFi networks.
A crypter for encrypting and obfuscating malicious code.
A tool for unlocking and bypassing security measures on devices.
The latest version of Remcos RAT bundled with a crypter.
A lightweight remote access tool.
A web panel for managing various RATs and exploits.
A tool for creating and deploying multiple types of exploits.
A powerful remote access tool with extensive capabilities.
A premium version of the Quasar RAT for remote control.
A stealer malware designed to extract sensitive information from target systems.
A builder for creating stealthy cryptocurrency miners.
Setup for Technitium MAC Address Changer, used to spoof MAC addresses.
A remote access tool for controlling target machines, 2023 edition.
A master version of the WH-RAT for remote access.
Software designed to securely erase all data on a hard drive
A tool for decompiling and recompiling APK files.
A Remote Access Trojan targeting various platforms.
A binder tool for combining multiple files into one executable.
A penetration testing tool used for advanced threat emulation.
A popular Remote Access Trojan used for controlling target machines.
A post-exploitation framework for conducting various attacks.
A collection of exploits for testing vulnerabilities in systems.
A widely used framework for developing and executing exploits.
A vulnerability scanner used to identify potential security issues in systems.
A network scanning tool used to discover hosts and services on a network.
A network protocol analyzer used for network troubleshooting and analysis.
An integrated penetration testing tool for finding vulnerabilities in web applications.