Malware programs written in python, reference from PatrikH0lop/malware_showcase
☆55May 17, 2022Updated 3 years ago
Alternatives and similar repositories for malware_python
Users that are interested in malware_python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Understand the nature of malicious software with practical examples in Python.☆2,232Dec 19, 2023Updated 2 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆21Mar 6, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Mini Karma Router for Pentester☆14Jul 30, 2015Updated 10 years ago
- Alex Lynd's portfolio site, using the Doks Hugo theme.☆13Jun 5, 2023Updated 2 years ago
- Your eyes on the target - SPY☆25Jul 24, 2020Updated 5 years ago
- Code in the Book!☆11Oct 15, 2018Updated 7 years ago
- Easy Port Scanner with Python☆14Dec 3, 2021Updated 4 years ago
- Enable Monitor mode & Packet Injection in Raspberry Pi☆26Nov 13, 2021Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆23Aug 24, 2021Updated 4 years ago
- Small AVR project using cake, arduino-midi-library and avr-builder altogether, making bleeps and blops.☆10Apr 7, 2017Updated 9 years ago
- Research project showcasing various malware evasion techniques used to bypass AVs and EDRs, continuously updated with new methods.☆39Jan 8, 2025Updated last year
- Very simple batch and bash scripts for both windows and linux. You can convert M3U8 stream playlist to a playable MP4 video. You can also…☆12Jan 18, 2023Updated 3 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Modular, opensource, high performance G-code interpreter and CNC controller written in Object-Oriented C++☆10Jun 17, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- Utility tool to automate the scraping of Telegram groups/channels.☆15Apr 28, 2025Updated last year
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- ReactiveX for data science☆14Sep 18, 2025Updated 7 months ago
- Docker that queries Starlinks Dishy and serves you the response on it's own web server☆11Nov 6, 2021Updated 4 years ago
- ☆11Jul 16, 2022Updated 3 years ago
- A process for making a flat screen appear curved to closer resemble a CRT.☆11Dec 8, 2020Updated 5 years ago
- A program to find the real string for your hash. MD5, SHA256, any really. Works really fast, gets to the "aaaa" combo in about 1 second e…☆17Jun 5, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Raspberry Pi USB booting code, moved from tools repository☆15Nov 14, 2022Updated 3 years ago
- A guide for porting mods in BeatSaber☆17Mar 10, 2022Updated 4 years ago
- The leaked sources of the Russian onion marketplace☆21Jan 17, 2023Updated 3 years ago
- Network worms capable of stealing files from and deleting sensitive information from remote system.☆22Nov 12, 2016Updated 9 years ago
- ANY.RUN sandbox detection collection☆24Aug 21, 2024Updated last year
- Retrieve IP Geolocation information☆13Feb 20, 2021Updated 5 years ago
- Software for the Arduino Leonardo and Arduino Micro that allow these devices to become USB adaptors for classic game console joysticks (e…☆12Dec 29, 2016Updated 9 years ago