Gork3m / Win10-UAC-Bypass
UAC Bypass exploit for x64 Windows 10 machines, still not patched.
☆18Updated 4 years ago
Alternatives and similar repositories for Win10-UAC-Bypass:
Users that are interested in Win10-UAC-Bypass are comparing it to the libraries listed below
- ☆14Updated 2 years ago
- Hallucinate is a trojan malware (for educational purposes) similar to Maya Gold.scr and Mist. The source code will be released after Ende…☆13Updated 2 years ago
- Malwares are here☆23Updated 2 weeks ago
- a "process-less" trojan☆12Updated 4 years ago
- ☆16Updated 2 years ago
- ☆10Updated 3 years ago
- ☆10Updated 2 years ago
- ☆10Updated 3 years ago
- Source code of TrojanXD☆13Updated 2 years ago
- ☆12Updated 2 years ago
- WARNING: This repository full of malicious programs, and this is used for educational purposes! Any actions from any malwares to your com…☆20Updated 7 months ago
- Yee ennoy☆11Updated last year
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Updated last year
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆16Updated 4 years ago
- Collection of various types of win32 malware & tools etc.☆23Updated 2 years ago
- GDI malware☆12Updated 3 years ago
- ☆17Updated 8 months ago
- ☆9Updated 2 years ago
- Live Malware samples☆16Updated 4 years ago
- Gdi trojan with destructive elements, very extensive payloads last about 6-8 minutes☆7Updated 3 years ago
- ☆32Updated last year
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆17Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 3 years ago
- Screen Locker virus (open source)☆10Updated 4 years ago
- This tool is a discord autospreader, meaning once infected it will grab the token of anyone on the pc, grab their friends, and send itsel…☆29Updated 2 years ago
- A simple script to overwrite the MBR (Master Boot Record) using the Python coding language. This is only for educational purposes only, a…☆16Updated 3 years ago
- ☆14Updated 4 years ago
- All of non-GDI malwares, GDI malwares, ransomwares, joke programs, games and more stuff are here! :)☆29Updated this week
- Source of Magnetar.exe☆9Updated 3 years ago