Mahmoud7Osman / VSSLinks
Linux-Based Reverse Shell Builder For Linux Penetration Testers
☆43Updated 3 years ago
Alternatives and similar repositories for VSS
Users that are interested in VSS are comparing it to the libraries listed below
Sorting:
- Golang malware development library☆19Updated 3 years ago
- My First Web Page, It's About if You Should learn Binary Exploitation in 2022.☆21Updated 3 years ago
- Input/Output Assembly Header coded by me.☆10Updated last year
- A Key Calculation Based Program For Data Confidentiality Over A Steganography-Like Technique Using The ROT Algorithm☆23Updated 3 years ago
- Cleny is An Interpreted Coding Language Used To Facilitate UI Structuring And Styling For CLI Based Projects☆108Updated 2 years ago
- Multiple Of Scripts Useful For System Administration In Linux Servers & Distributions, Driven By a Fast Easy-to-Use Menu Script☆53Updated 3 years ago
- Library For Creating Local & Remote Procedure Calls Between Different Running Processes☆82Updated last year
- Open source linux-based-toolkit for basic cyber security students, social engineers, linux users....☆20Updated last year
- These are some books that will help you in your learning,I got them in my cyber security career, These books for: pentesting, programming…☆63Updated 3 years ago
- ☆12Updated 3 years ago
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Keylogger | Botnets | Worms | Other Network Tools☆177Updated 4 years ago
- This virus can destroy your computer :-)☆28Updated 4 years ago
- GDI malware☆11Updated 4 years ago
- Complete Python RansomeWare Source Code With Full Decoumetions.☆219Updated 2 years ago
- Activation For Burpsuite Professional By UNCIA☆19Updated 3 years ago
- A simple script to overwrite the MBR (Master Boot Record) using the Python coding language. This is only for educational purposes only, a…☆16Updated 3 years ago
- A builder for BatchStealer☆21Updated 3 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Updated 4 years ago
- Source code of TrojanXD☆14Updated 3 years ago
- this used to be a private virus but i have it so now its not☆11Updated 3 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Updated 4 years ago
- This program uses the discord.net library to rat (remote access trojan) your victims computer. You can control it in a discord server and…☆22Updated 3 years ago
- ☆16Updated 2 years ago
- Community driven computer worm☆69Updated 3 years ago
- Remote Access Trojan collection.(260+ RAT-Builders!)☆252Updated 3 years ago
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆115Updated last year
- ☆34Updated 5 years ago
- *This is only for educational purposes, I'm not responsible for anything whatsoever made using those actually malicious software* A malwa…☆12Updated 3 years ago
- Malwares are here☆24Updated 8 months ago
- The repository contains the Malware Projects ---> Malicious Softwares as like RansomWare , Spyware etc developed my own while learning …☆15Updated 4 years ago