HUGOW04 / TuAntivirus
Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other malware, antivirus software started to protect from other computer threats. In particular, modern antivirus software can protect users from malicious browser helper objects (BHOs), browser hijackers, ransomw…
☆11Updated 2 years ago
Alternatives and similar repositories for TuAntivirus:
Users that are interested in TuAntivirus are comparing it to the libraries listed below
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 2 months ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Public exploits☆15Updated 6 years ago
- ☆15Updated 2 years ago
- A port scanner written in PowerShell☆13Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆13Updated 2 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆12Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Updated last year
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆22Updated 2 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 3 years ago
- Lists of the top attacking IP addresses trying to hack or compromise Wordpress web sites.☆8Updated 7 years ago
- Windows Encrypt/Decrypt using AES 256 bit keys☆12Updated 4 years ago
- ☆8Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆12Updated 7 years ago
- Collecting Some Ransomeware Sources For educational pruposes Only .☆9Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Maltego transform with Keskivonfer☆14Updated 4 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 3 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago