Network worms capable of stealing files from and deleting sensitive information from remote system.
☆22Nov 12, 2016Updated 9 years ago
Alternatives and similar repositories for Worms
Users that are interested in Worms are comparing it to the libraries listed below
Sorting:
- AES Crypter for Society of Engineers Remote Access Trojan (RAT) Project Lead: Derek Ta Security Programmer: Taegan Warren☆16Nov 29, 2014Updated 11 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆25Jul 19, 2024Updated last year
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- Plugin metademands for GLPI☆12Updated this week
- Using Raspberry Pi, Python, MQTT, Home Assistant, a relay, and a magnetic proximity sensor, I open, close, stop, and report the status of…☆11Nov 7, 2016Updated 9 years ago
- In this project a robot that can be operated by authorized person or operator is implemented. For this purpose we use a face re…☆12Jun 20, 2018Updated 7 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- A tool for recursively scanning websites for defacements☆10Nov 22, 2022Updated 3 years ago
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated 10 months ago
- This contains 100 days of the notes which i have learned with the internship.☆18Dec 1, 2024Updated last year
- Python Visual Hash, generate a visual random image associated with a string.☆11Apr 23, 2017Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆41Oct 11, 2015Updated 10 years ago
- ☆11Oct 13, 2025Updated 4 months ago
- ☆11Aug 23, 2022Updated 3 years ago
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- Open source design for centrifugal air pump for open source ventilator☆10Apr 14, 2020Updated 5 years ago
- Get ALL of the AKER Kit source file packs. If you love them, don't forget to tell us about it - aaron@akerkits.com☆10May 24, 2017Updated 8 years ago
- Solutions for CSS Layout Exercises☆12Feb 5, 2021Updated 5 years ago
- plugin for osTicket to allow for tickets to be scheduled or to recurr☆10Apr 16, 2014Updated 11 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Things I wish were Go built-ins☆13Sep 29, 2020Updated 5 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Research work on how to create a Email Marketing subject line to produce maximum open rate☆10Feb 11, 2016Updated 10 years ago
- Translate Strapi collections into multiple languages using Google Cloud Translation☆11Jan 28, 2026Updated last month
- Ansible role to install beehive https://github.com/muesli/beehive☆12Jun 30, 2017Updated 8 years ago
- Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR/MS-RPRN and S…☆11Apr 9, 2022Updated 3 years ago
- my personal .bashrc files, with all my alias, tricks and ascii art☆13Oct 22, 2020Updated 5 years ago
- A program capable of opening multiple Selenium web-driver windows while rotating through a list of proxies. Randomized user-agents are a…☆10Jan 15, 2018Updated 8 years ago
- List of articles and repositories created by me about Microservices Architecture.☆10Oct 12, 2020Updated 5 years ago
- The most reliable source of background screening records. A frequent automated update process ensures the reliability & availability of u…☆11Jun 20, 2018Updated 7 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago