Artogn / malware-1View external linksLinks
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.
☆26Jun 29, 2017Updated 8 years ago
Alternatives and similar repositories for malware-1
Users that are interested in malware-1 are comparing it to the libraries listed below
Sorting:
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- Quickly Change Your MAC Address in OSX to a Random Address.☆13Jul 27, 2015Updated 10 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- ☆17Jan 17, 2024Updated 2 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- 国科大编译作业二:LLVM Pass处理函数调用☆18Nov 11, 2021Updated 4 years ago
- 国科大编译作业三:Point to 分析☆19Dec 12, 2021Updated 4 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- A small header C library to print stack trace on execution if an exception occurs (such as segmentation fault).☆23Jun 10, 2017Updated 8 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆26May 7, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- İnstagram Clone.You can sign in, sign up, upload image, make comment 📷 Used ReactJS, Material UI, Firebase, Firestore Database☆22May 21, 2021Updated 4 years ago
- Duet: static analysis for unbounded concurrency☆29Feb 6, 2026Updated last week
- ☆35Dec 21, 2023Updated 2 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- WiFi Attacking Application With User Interface☆11Dec 11, 2022Updated 3 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆34Feb 2, 2026Updated last week
- ☆10Aug 9, 2024Updated last year
- This Arduino sketch is used to control 2 DC motors and 2 optical encoders from printer head frame by step/ direction signals.☆12Sep 27, 2020Updated 5 years ago
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- Generates a Random User Profile☆12Mar 23, 2024Updated last year
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- Telegram bot which helps in promoting Instagram accounts☆10Apr 13, 2020Updated 5 years ago
- How to hack webcams☆10Jan 7, 2022Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- MiHome is an open source environmental sensor. It was designed to provide students and researchers a cheap and reliable data platform. Us…☆10Feb 25, 2023Updated 2 years ago
- Most powerfull Wifi Jammier.with fixes.☆12Oct 14, 2022Updated 3 years ago
- This script is for photographers to do timeslice with one click.☆13Aug 21, 2022Updated 3 years ago
- Adobe Photoshop plugin that aims to streamline the process of creating frame-by-frame animations.☆10Aug 27, 2024Updated last year
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Pulsar-plot of Strava runs in Swift 3☆12Apr 2, 2018Updated 7 years ago
- BadUSB Teensy downexec exploit support Windows & Linux / Windows Cmd & PowerShell addUser exploit☆36Mar 9, 2019Updated 6 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- 国科大编译作业:基于Clang的C语言解释执行器☆43Dec 12, 2021Updated 4 years ago
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago