Network worms capable of stealing files from and deleting sensitive information from remote system.
☆22Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for Worms
Users that are interested in Worms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple, yet powerful malware for windows☆11May 10, 2018Updated 8 years ago
- Educational reverse-shell / client-server demo (lab-only)☆87Apr 17, 2026Updated last month
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆530Oct 5, 2022Updated 3 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆18Mar 22, 2020Updated 6 years ago
- 🎩 [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botnet, Rootkit, Malware, Spyware, Python, Go, C|EH.☆17Apr 15, 2021Updated 5 years ago
- Apartman Yönetim Sistemi☆14Apr 3, 2023Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- GNURadio OOT module for decoding KeeLoq transmitters.☆10Jun 30, 2017Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A C++ API which is useful for Win32. Includes a communication subsystem.☆14Oct 25, 2017Updated 8 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12May 13, 2025Updated last year
- ☆13Apr 1, 2017Updated 9 years ago
- ☆18Feb 4, 2014Updated 12 years ago
- Discover Domains Associated with a Reverse IP Lookup☆38Nov 23, 2025Updated 5 months ago
- A working version of the famous Bootstrap Blog-Home template http://startbootstrap.com/template-overviews/blog-home/☆12Mar 30, 2022Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- ☆13Nov 28, 2016Updated 9 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 4 years ago
- Collection of Virii - Worms - Trojan☆32Dec 17, 2022Updated 3 years ago
- This tool is a discord autospreader, meaning once infected it will grab the token of anyone on the pc, grab their friends, and send itsel…☆34Apr 28, 2022Updated 4 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆16May 1, 2018Updated 8 years ago
- Yii2 gallery module☆12Dec 28, 2016Updated 9 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- blueimp gallery in your Yii2 application☆13Aug 22, 2021Updated 4 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆15Apr 26, 2022Updated 4 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 10 months ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 10 months ago
- This project contains a set of scripts to facilitate the setup of the Jetson Nano for doing Deep Learning with Tensorflow 2.0 (and also w…☆11Oct 25, 2019Updated 6 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago