NeenuAVarghese / Worms
Network worms capable of stealing files from and deleting sensitive information from remote system.
☆19Updated 8 years ago
Alternatives and similar repositories for Worms:
Users that are interested in Worms are comparing it to the libraries listed below
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated 2 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆88Updated 5 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Simple keylogger on C++ with several functions.☆17Updated 4 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 4 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- An open-source, centralized HTTPS botnet☆44Updated 4 years ago
- blackhole is a ransomware coded in c#☆27Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆97Updated 3 years ago
- (Windows/Linux/Mac) Remote Administration Tool☆63Updated 4 years ago
- Persistent & Undetectable Malware Backdoor☆29Updated 10 months ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 5 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Community driven computer worm☆60Updated 2 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Source code of Claw Key logger previously sold on HackForums☆54Updated 2 years ago
- An open source RansomWare☆86Updated 5 years ago
- Easy to understand back door written in python☆34Updated 2 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 4 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 4 years ago
- ☆9Updated 2 years ago