This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent ones
☆11Aug 26, 2014Updated 11 years ago
Alternatives and similar repositories for VX-Collectors-Edition
Users that are interested in VX-Collectors-Edition are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The PAper Papyrus ExtendeR. Plugin to expose new functions and events to Skyrim's "Papyrus" scripting language.☆12Jul 19, 2023Updated 2 years ago
- port of the skse plugin preloader for skse64/SSE☆17May 27, 2019Updated 6 years ago
- An open source version of the Dynamic Animation Replacer for Skyrim SE.☆13Mar 17, 2023Updated 3 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- fun rootkits stuff!☆20Jul 28, 2015Updated 10 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- ☆12Sep 11, 2014Updated 11 years ago
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Free sampling of files from the purported Equation Group hack.☆11Apr 10, 2017Updated 8 years ago
- A malware researching repository.☆21Aug 10, 2021Updated 4 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- A 3D mesh viewer for the Linux terminal written in C!☆21Jun 3, 2023Updated 2 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Nexus of Android banking Trojans☆15Oct 11, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Aug 20, 2013Updated 12 years ago
- Example repo to explain how use react in rage mp servers☆11Jan 5, 2022Updated 4 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Jul 4, 2020Updated 5 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Classe LaTeX que segue as “Normas para Apresentação de Trabalhos Acadêmicos e Científicos: Documento Impresso e/ou Digital”, 8ª edição re…☆16Jul 1, 2021Updated 4 years ago
- Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so p…☆16Jan 2, 2019Updated 7 years ago
- React input and textarea components integrated with an Emoji Picker☆24Nov 26, 2019Updated 6 years ago
- An Amazon OSINT scraper for potential scam accounts☆33Jan 17, 2019Updated 7 years ago