blackmassgroup / minegrief
Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect.
☆116Updated last month
Alternatives and similar repositories for minegrief:
Users that are interested in minegrief are comparing it to the libraries listed below
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- ☆185Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆100Updated last month
- Slides & Code snippets for a workshop held @ x33fcon 2024☆250Updated 8 months ago
- Collection of codes focused on Linux rootkits☆84Updated 3 weeks ago
- Analyse your malware to surgically obfuscate it☆452Updated last month
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆241Updated this week
- Offensive Lua.☆179Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆253Updated 2 months ago
- ☆63Updated 3 weeks ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- Public repository containing materials for various malware-related streams.☆34Updated last month
- (0day) Local Privilege Escalation in IObit Malware Fighter☆115Updated last month
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆52Updated last year
- Embed a payload inside a PNG file☆291Updated 3 months ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆137Updated 5 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆306Updated 2 weeks ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆140Updated 3 months ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆173Updated last year
- A repository of credential stealer formats☆193Updated last month
- My collection of malware dev links☆255Updated 5 months ago
- A Mythic Agent written in PIC C.☆171Updated 2 weeks ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆204Updated 2 weeks ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆117Updated this week
- ☆103Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆160Updated last month