Network worms capable of stealing files from and deleting sensitive information from remote system.
☆22Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for Worms
Users that are interested in Worms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple, yet powerful malware for windows☆11May 10, 2018Updated 7 years ago
- Worm implemented in Python☆87Apr 14, 2016Updated 9 years ago
- Python network worm that spreads on the local network and gives the attacker control of these machines.☆531Oct 5, 2022Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 8 months ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆17Jun 7, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- DEDSEC_BKIF is a keystroke injection tool for Android, Linux, and iOS.☆27Jan 19, 2026Updated 2 months ago
- some python3 functions to add spreading features to any python backdoor☆56Jan 22, 2017Updated 9 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆19Jul 14, 2022Updated 3 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Image cutter☆10Feb 20, 2017Updated 9 years ago
- A Proof-of-Concept win32 DLL that makes use of netbios session token replay to propagate through a Windows Domain☆25Apr 14, 2018Updated 7 years ago
- ☆12May 13, 2025Updated 10 months ago
- Open-source, enterprise-grade threat modeling platform☆47Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Download all termux social media hacking tools in one command☆32May 15, 2021Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- Reverse Windows shell over TLS☆19Mar 3, 2016Updated 10 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- Collection of Virii - Worms - Trojan☆31Dec 17, 2022Updated 3 years ago
- This tool is a discord autospreader, meaning once infected it will grab the token of anyone on the pc, grab their friends, and send itsel…☆34Apr 28, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- TOD (Thumb On Demand) for Yii2☆20Jul 20, 2021Updated 4 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆16May 1, 2018Updated 7 years ago
- Yii2 gallery module☆12Dec 28, 2016Updated 9 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- POC - x64 injector -> x86 injectee dll injector☆15Apr 4, 2024Updated 2 years ago
- blueimp gallery in your Yii2 application☆13Aug 22, 2021Updated 4 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- ☆11Oct 13, 2025Updated 5 months ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 9 months ago
- Hyperterm theme based on gruvbox☆17Feb 10, 2017Updated 9 years ago
- ☆14Dec 22, 2015Updated 10 years ago
- TaskMgr Volatile Environment LPE☆16Jun 28, 2025Updated 9 months ago
- ☆10Oct 1, 2016Updated 9 years ago
- SSH bruteforce utility☆21Dec 5, 2018Updated 7 years ago