0x050f / deathLinks
A Metamorphic virus 🌺
☆17Updated 3 years ago
Alternatives and similar repositories for death
Users that are interested in death are comparing it to the libraries listed below
Sorting:
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Packet crafting, injection and sniffing tool☆69Updated 2 months ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆50Updated last week
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 4 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆14Updated this week
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆18Updated last year
- ☆47Updated 3 months ago
- Tool for extracting credentials locally stored by web browsers☆33Updated 3 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 9 months ago
- ☆33Updated 2 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Updated 7 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆17Updated last year
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆21Updated 3 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- ☆19Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last month
- ⚠️ Malware Development training ⚠️☆37Updated 7 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- A Repository to Track Anti-Forensic Techniques☆112Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year