Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.
☆26Jun 29, 2017Updated 8 years ago
Alternatives and similar repositories for malware-1
Users that are interested in malware-1 are comparing it to the libraries listed below
Sorting:
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- Quickly Change Your MAC Address in OSX to a Random Address.☆13Jul 27, 2015Updated 10 years ago
- ☆17Jan 17, 2024Updated 2 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- 国科大编译作业二:LLVM Pass处理函数调用☆18Nov 11, 2021Updated 4 years ago
- 国科大编译作业三:Point to 分析☆19Dec 12, 2021Updated 4 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- Interactive Arts 1; Installation & Immersive Environments - course repo. University of Montana, School of Media Arts☆14Aug 24, 2020Updated 5 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆26May 7, 2020Updated 5 years ago
- A small header C library to print stack trace on execution if an exception occurs (such as segmentation fault).☆23Jun 10, 2017Updated 8 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- İnstagram Clone.You can sign in, sign up, upload image, make comment 📷 Used ReactJS, Material UI, Firebase, Firestore Database☆22May 21, 2021Updated 4 years ago
- Duet: static analysis for unbounded concurrency☆30Feb 6, 2026Updated last month
- ☆35Dec 21, 2023Updated 2 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- This Arduino sketch is used to control 2 DC motors and 2 optical encoders from printer head frame by step/ direction signals.☆12Sep 27, 2020Updated 5 years ago
- ☆10Aug 9, 2024Updated last year
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated last month
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- MiHome is an open source environmental sensor. It was designed to provide students and researchers a cheap and reliable data platform. Us…☆10Feb 25, 2023Updated 3 years ago
- Pulsar-plot of Strava runs in Swift 3☆12Apr 2, 2018Updated 7 years ago
- User action detection toolkit. Spy on mobile phone apps using machine learning-based attacks on the encrypted traffic.☆11Sep 4, 2019Updated 6 years ago
- Style transfer API for PHP: An example HTML webpage for neural style transfer using the Deep Art Effects API.☆12Jul 6, 2025Updated 8 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Generates a Random User Profile☆12Mar 23, 2024Updated last year
- This script is for photographers to do timeslice with one click.☆13Aug 21, 2022Updated 3 years ago
- Telegram bot which helps in promoting Instagram accounts☆10Apr 13, 2020Updated 5 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Python script with one simple purpose: to get all or any detailed informations about wifi networks on mac OS. I've written this tool as t…☆10Jul 1, 2019Updated 6 years ago
- How to hack webcams☆10Jan 7, 2022Updated 4 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- BadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit☆36Mar 9, 2019Updated 6 years ago