HUGOW04 / TuAntivirusLinks
Antivirus software was originally developed to detect and remove computer viruses, hence the name. However, with the proliferation of other malware, antivirus software started to protect from other computer threats. In particular, modern antivirus software can protect users from malicious browser helper objects (BHOs), browser hijackers, ransomw…
☆11Updated 2 years ago
Alternatives and similar repositories for TuAntivirus
Users that are interested in TuAntivirus are comparing it to the libraries listed below
Sorting:
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated 2 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Updated 2 years ago
- RATs library 2003 to present☆14Updated last year
- Loading unmanaged dll (32 and 64bits) in managed exe☆10Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Public exploits☆14Updated 7 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live opera…☆18Updated 2 years ago
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Updated 2 years ago
- ☆16Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆15Updated 2 weeks ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆15Updated last year
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆16Updated 4 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Updated 4 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆9Updated 3 years ago
- A utility that can be used to launch an executable with a DLL injected☆20Updated last year
- ☆10Updated 3 years ago
- Zombie Content management systems exploitation Bot Source☆10Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆26Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago