11philip22 / MEGAabuse
uploads unlimited files......... for free
☆12Updated 3 years ago
Alternatives and similar repositories for MEGAabuse:
Users that are interested in MEGAabuse are comparing it to the libraries listed below
- The GTK Keylogger☆19Updated last year
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- electron app with remote access tool (RAT) functionality☆9Updated 6 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆25Updated 6 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- CryptoWall 3.0 Ransomware Reversing Documentation & Scripts☆18Updated 4 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆18Updated 2 months ago
- A small library helping to parse commandline parameters (for C/C++)☆57Updated last year
- fanny.bmp MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆39Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- Light C++ Logger Library☆18Updated 7 years ago
- ☆7Updated 5 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆10Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 6 years ago