NeenuAVarghese / WormsView external linksLinks
Network worms capable of stealing files from and deleting sensitive information from remote system.
☆22Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for Worms
Users that are interested in Worms are comparing it to the libraries listed below
Sorting:
- Worm implemented in Python☆87Apr 14, 2016Updated 9 years ago
- Simple, yet powerful malware for windows☆11May 10, 2018Updated 7 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆526Oct 5, 2022Updated 3 years ago
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 6 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- Plugin metademands for GLPI☆12Feb 5, 2026Updated last week
- This contains 100 days of the notes which i have learned with the internship.☆17Dec 1, 2024Updated last year
- Using Raspberry Pi, Python, MQTT, Home Assistant, a relay, and a magnetic proximity sensor, I open, close, stop, and report the status of…☆11Nov 7, 2016Updated 9 years ago
- In this project a robot that can be operated by authorized person or operator is implemented. For this purpose we use a face re…☆12Jun 20, 2018Updated 7 years ago
- Python Visual Hash, generate a visual random image associated with a string.☆11Apr 23, 2017Updated 8 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 8 months ago
- ISPConfig 3.1 for FreeBSD 11.1-RELEASE☆11Jun 29, 2019Updated 6 years ago
- plugin for osTicket to allow for tickets to be scheduled or to recurr☆10Apr 16, 2014Updated 11 years ago
- Open source design for centrifugal air pump for open source ventilator☆10Apr 14, 2020Updated 5 years ago
- A low-cost remote vital signs monitor for home patients☆12Sep 21, 2020Updated 5 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- ☆11Aug 23, 2022Updated 3 years ago
- List of articles and repositories created by me about Microservices Architecture.☆10Oct 12, 2020Updated 5 years ago
- Utility to generate a TLS Certificate.☆17Apr 11, 2020Updated 5 years ago
- The most reliable source of background screening records. A frequent automated update process ensures the reliability & availability of u…☆11Jun 20, 2018Updated 7 years ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 2 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 8 months ago
- ☆14Oct 9, 2021Updated 4 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Kanboard Comment-Only Restriction☆12Dec 12, 2018Updated 7 years ago
- This research analyze the binary options market on EURUSD M1, M5 and M15 timeframes with data gotten from Metatrader 5☆12Jul 12, 2021Updated 4 years ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- clone from apfree-wifidog☆10Jan 26, 2023Updated 3 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Ansible role to install beehive https://github.com/muesli/beehive☆12Jun 30, 2017Updated 8 years ago
- Research work on how to create a Email Marketing subject line to produce maximum open rate☆10Feb 11, 2016Updated 10 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 3 years ago