A collection of destructive, prank, and surveillance batch/VBS scripts for ethical hacking education. Use in isolated environments only.
-
Updated
Jul 30, 2025 - Batchfile
A collection of destructive, prank, and surveillance batch/VBS scripts for ethical hacking education. Use in isolated environments only.
Ein modulares Malware-Simulationsframework für Bildungs- und Forschungszwecke. Dieses Projekt demonstriert verschiedene Techniken moderner Malware (Netzwerkverbreitung, Persistence, Evasion, C2) in einer sicheren Sandbox-Umgebung ohne tatsächliche schädliche Aktionen. Alle Funktionen werden nur simuliert und protokolliert
A RAM-only, AI-enhanced, stealth operating environment for red team simulations and cyber defense training.
This repository simulates a Discord-based C2 and demonstrates how to retrieve forensic artifacts from associated webhook URLs and bot tokens. It is intended strictly for educational and authorized testing purposes. Any unlawful use is prohibited. —KAiZ3n
Trojan Calculator Simulator v2.0 is a fully interactive educational tool that demonstrates Trojan horse behavior in a safe, simulated GUI environment.
Ransomware simulation framework built in Python. Includes encryption, exfiltration, and C2 server capabilities to test and validate EDR detections in controlled environments.
🔍 Discover powerful tools for penetration testing and cloud security, crafted by Cursed271 to help organizations defend against cyber threats.
Keylogging simulation tool for authorized purple team testing. Captures keystrokes and streams them to a controlled server with timestamps for EDR evaluation and detection tuning.
Add a description, image, and links to the malware-simulation topic page so that developers can more easily learn about it.
To associate your repository with the malware-simulation topic, visit your repo's landing page and select "manage topics."