I-DoNt-LiKe-Micro-Soft / Doom-VirusLinks
I am making a python virus that will be fully undetectable. And use zero third party modules !. This is a proof of concept that all antiviruses are trash.
☆10Updated 2 years ago
Alternatives and similar repositories for Doom-Virus
Users that are interested in Doom-Virus are comparing it to the libraries listed below
Sorting:
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆28Updated 2 years ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆174Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- ☆22Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆272Updated 4 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- ☆124Updated last year
- A collection of malwares found on the internet.☆65Updated 2 years ago
- An open-source .NET Ransomware☆24Updated 4 years ago
- control windows computeur from telegram☆67Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆55Updated 2 years ago
- ☆206Updated 2 years ago
- Here are +200 different rats some with source code☆144Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- Exploits USB HID to steal passwords saved in Google Chrome☆70Updated 8 years ago
- Hacking with PasteJacking technique☆22Updated last year
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- Project to implement and automate juice jacking: the stealing of phone data through USB connections☆103Updated 8 years ago
- A Simple RedLineStealer☆13Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆55Updated 3 years ago
- Clipboard poisoning attack.☆58Updated 5 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆84Updated 2 years ago
- A simple, fully python ransomware PoC using AES-CTR and RSA. Supports Windows, Linux and macOS☆141Updated 4 years ago
- steal chrome saved passwords "undetectable"☆51Updated 3 years ago
- Windows Hacking FrameWork using Reverse Shell☆108Updated 10 months ago
- Remote Administration tool for Windows Systems written in pure Python☆136Updated last year