Malware that TeamTNT found and removed.
☆14Nov 27, 2020Updated 5 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- Monitor and prevent unexpected behavior of Java programs.☆14Jul 6, 2021Updated 4 years ago
- stupid ptrace tricks☆12May 19, 2021Updated 4 years ago
- file or one command☆11Oct 29, 2023Updated 2 years ago
- ☆15Dec 16, 2025Updated 2 months ago
- ☆16Jun 9, 2023Updated 2 years ago
- ☆17Nov 24, 2020Updated 5 years ago
- 恶意脚本检测分类工具☆40Jan 26, 2021Updated 5 years ago
- A userland USB gadget driver for macOS 12 which emulates a HID keyboard☆20May 4, 2022Updated 3 years ago
- A Lua 5.1 Bytecode Decompiler written in Rust☆20Jan 29, 2019Updated 7 years ago
- 整理每个流行botnet家族的专杀脚本、靶机环境、检测规则、病毒样本、病毒原理图☆76Mar 29, 2021Updated 4 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 2 years ago
- Simple Library calls tracer☆22Feb 19, 2018Updated 8 years ago
- CVE-2022-21907 Vulnerability PoC☆30Jan 23, 2022Updated 4 years ago
- via load data local infile to attack client☆30Oct 29, 2019Updated 6 years ago
- Serialize/deserialize Range in HTML.☆15Jan 30, 2026Updated last month
- ☆12Mar 19, 2023Updated 2 years ago
- Numbeo Unofficial API☆15Oct 16, 2022Updated 3 years ago
- ☆14Nov 21, 2025Updated 3 months ago
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago
- vidy007's dotfiles☆11Jan 21, 2025Updated last year
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆18Sep 9, 2025Updated 5 months ago
- A remapper for Touhou Project☆12Mar 24, 2023Updated 2 years ago
- Python client for IP to ASN lookup services☆12Feb 21, 2026Updated last week
- A repo for output of an intrusion prediction project☆11Feb 15, 2026Updated 2 weeks ago
- Users can submit orders to milady pool and have their orders only execute at optimal prices☆10Sep 17, 2024Updated last year
- This is a mirror of the main Bitbucket repository. Issue tracking is done on Bitbucket☆12Jun 29, 2022Updated 3 years ago
- Vulnerable code clone detection technique. Published in EuroS&P2020☆10Sep 4, 2020Updated 5 years ago
- ☆11Sep 5, 2019Updated 6 years ago
- ☆11Dec 5, 2024Updated last year
- traefik stack for balenaCloud to proxy https domains to internal services☆11Oct 3, 2020Updated 5 years ago
- Code to Scraping some portion of Data from forum(RaidForums[seized by FBI]) with Python SCRAPY spiders bypassing recaptcha and storing to…☆10Feb 25, 2021Updated 5 years ago
- Use java instrument API without JAR file☆47Jun 19, 2022Updated 3 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆45Nov 7, 2023Updated 2 years ago
- 📗 Documents of Linux ELF binary signature verification solution.☆11Nov 30, 2020Updated 5 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- ☆11Jan 8, 2022Updated 4 years ago
- ☆11Mar 19, 2022Updated 3 years ago
- ☆13Sep 15, 2024Updated last year