arialdomartini / morris-wormView external linksLinks
The decompiled Morris Worm source code
☆644Nov 24, 2020Updated 5 years ago
Alternatives and similar repositories for morris-worm
Users that are interested in morris-worm are comparing it to the libraries listed below
Sorting:
- The fractal land generator☆15Aug 3, 2019Updated 6 years ago
- EternalRocks worm☆467May 25, 2017Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- malware source codes☆570Dec 16, 2022Updated 3 years ago
- x86 16-bit program drawing the heart curve equation☆17Feb 15, 2021Updated 5 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆66Nov 10, 2017Updated 8 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,539Dec 8, 2020Updated 5 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- Simple C++ ransomware, prove the concept.☆27Mar 8, 2017Updated 8 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- Sample Rootkit for Linux☆403Jul 29, 2024Updated last year
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆11Apr 18, 2017Updated 8 years ago
- a simple operating system☆10May 10, 2015Updated 10 years ago
- I Know Where Your Page Lives: Derandomizing the latest Windows 10 Kernel - ZeroNights 2016☆171Dec 7, 2016Updated 9 years ago
- A snake game for MS-DOS. 🐍☆19Sep 3, 2024Updated last year
- BitBender is a byte manipulation tool☆12Mar 2, 2018Updated 7 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆313Jan 13, 2021Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,286Sep 4, 2022Updated 3 years ago
- EGESPLOIT is a golang library for malware development☆340Jan 26, 2017Updated 9 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- A library for efficient interception of established TCP connections☆20Oct 12, 2015Updated 10 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- BEURK Experimental Unix RootKit☆389Apr 28, 2017Updated 8 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Worm implemented in Python☆87Apr 14, 2016Updated 9 years ago
- Wintermute Endpoint Search: Parse source code pulling out endpoints, parameters, and a bunch of other stuff☆14May 20, 2019Updated 6 years ago
- ☆10Feb 18, 2016Updated 9 years ago
- Tools for finding and analyzing Busy Beaver programs for Turing machines☆14Updated this week
- TinyForth Standard -- microscopic simplified forth standard of 35 words, designed to make forth as simple, extensible, and readable as po…☆13Feb 26, 2023Updated 2 years ago
- Parag Patel's Z80 Emulator☆50Apr 21, 2016Updated 9 years ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Feb 17, 2017Updated 8 years ago
- iOS malware samples☆43May 13, 2016Updated 9 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 8 years ago
- Open-source decompile of Stuxnet/myRTUs☆762Oct 15, 2018Updated 7 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 10 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago