Powerful windows malware with many features
☆17Mar 10, 2024Updated last year
Alternatives and similar repositories for ConF-Malware
Users that are interested in ConF-Malware are comparing it to the libraries listed below
Sorting:
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆12Oct 1, 2019Updated 6 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Source code of the Rensenware ransomware in .NET☆21Jul 24, 2021Updated 4 years ago
- ☆30Feb 24, 2022Updated 4 years ago
- This dataset contains all the 2020 COVID-19 related data from the paper "An Augmented Multilingual Twitter Dataset for Studying the COVID…☆11Jan 20, 2022Updated 4 years ago
- ☆10Mar 7, 2017Updated 8 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- PyDelta is a Python script designed to obfuscate Python source code, making it more difficult to understand and reverse-engineer.☆13Jul 13, 2024Updated last year
- We have moved!☆10Mar 29, 2016Updated 9 years ago
- ☆10Mar 12, 2024Updated last year
- ☆12Jan 21, 2025Updated last year
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Script to download books from scribd☆23Jun 24, 2012Updated 13 years ago
- instagram-bruteforce-attack☆43Oct 22, 2021Updated 4 years ago
- ☆14Dec 21, 2021Updated 4 years ago
- Yii2 第四方支付web系统☆10Sep 1, 2021Updated 4 years ago
- ☆13Oct 10, 2022Updated 3 years ago
- PrettyRecon-cli is an unofficial cli client for PrettyRecon. This tool can be used to trigger various tasks on prettyrecon as well as fe…☆10May 9, 2025Updated 9 months ago
- 免杀☆12May 6, 2024Updated last year
- Common classes and extension methods for use across Unity projects☆13Apr 18, 2020Updated 5 years ago
- C2 frameworks for RTO, server and implants for stealth red-teaming mode.☆13Sep 11, 2024Updated last year
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆44Nov 2, 2025Updated 3 months ago
- List all bitcoin addresses with positive balance.☆11May 14, 2024Updated last year
- A TOML parser for CHICKEN Scheme built with comparse☆12Jun 12, 2019Updated 6 years ago
- Allows only modded civs, and removes base game civs including their unique buildings and unique units.☆12Feb 27, 2023Updated 3 years ago
- Github repository for The Venus Project's website☆12May 30, 2018Updated 7 years ago
- ☆15Sep 9, 2017Updated 8 years ago
- Contract of Interactive Coin Offering☆11Jul 16, 2018Updated 7 years ago
- This is a project of Visual Basic. It can be generate simple 20+ virus. You can download and run the project and create virus files after…☆10Mar 12, 2018Updated 7 years ago
- This is a folder with 69 files, and this is a 34 GDI effects(1 file is CMakeList.txt), 34 - compiled files, 34 source code files. Thanks …☆11Mar 10, 2024Updated last year
- Automated Wifi Hacking Tool☆10Mar 16, 2021Updated 4 years ago
- Reliable UDP, Author Whg☆15Oct 8, 2019Updated 6 years ago
- Fake Windows Update Prank☆13May 3, 2017Updated 8 years ago
- TOOL - Unauthenticated Remote DNS , Scanner ranger IP.☆11Feb 18, 2015Updated 11 years ago
- (Skidded) Malware by Clxcq. Neither i or clxcq are responsible for any damage☆12Jun 11, 2022Updated 3 years ago
- this used to be a private virus but i have it so now its not☆12Oct 18, 2021Updated 4 years ago