arialdomartini / morris-worm
The decompiled Morris Worm source code
☆604Updated 4 years ago
Alternatives and similar repositories for morris-worm:
Users that are interested in morris-worm are comparing it to the libraries listed below
- Hundreds of 20th Century viruses; clone this repository to upset your AV☆206Updated 2 years ago
- Hardware backdoors in some x86 CPUs☆2,346Updated 6 years ago
- Open-source decompile of Stuxnet/myRTUs☆735Updated 6 years ago
- The x86 processor fuzzer☆494Updated 6 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆557Updated 7 years ago
- Public open-source code of malware Stuxnet (aka MyRTUs).☆1,011Updated 2 years ago
- Proof of Concepts (PE, PDF...)☆1,488Updated 3 weeks ago
- Collection of ancient computer virus source codes☆608Updated 3 years ago
- An exploration of code homeomorphism☆371Updated 6 years ago
- Exercises for Assembly language course☆334Updated 2 years ago
- A minimalist kernel☆1,338Updated 3 years ago
- Proof-of-concept for the ZombieLoad attack☆813Updated 3 years ago
- Psychological warfare in reverse engineering☆984Updated 4 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,434Updated 4 years ago
- ☆467Updated 2 months ago
- Invaders game in 512 bytes (boot sector)☆519Updated 3 years ago
- Pillman boot sector game, a yellow thing eats pills and is chased by monsters.☆319Updated 3 years ago
- Intel Management Engine JTAG Proof of Concept☆513Updated 4 years ago
- EternalRocks worm☆451Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,015Updated 10 months ago
- VirtualBox E1000 Guest-to-Host Escape☆1,404Updated 6 years ago
- ransomware open-sources☆744Updated 4 years ago
- malware source codes☆548Updated 2 years ago
- A small, bootable game written in x86 Assembly inspired by Space Invaders☆216Updated 5 years ago
- Zero-Day Code Injection and Persistence Technique☆1,221Updated 2 years ago
- Architectural privilege escalation on x86☆849Updated 6 years ago
- Interactive shellcoding environment to easily craft shellcodes☆894Updated 3 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,155Updated 2 years ago
- https://twitter.com/itsreallynick/status/1120410950430089224☆390Updated 5 years ago