blackmassgroup / minegriefLinks
Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect.
☆119Updated 5 months ago
Alternatives and similar repositories for minegrief
Users that are interested in minegrief are comparing it to the libraries listed below
Sorting:
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 2 months ago
- ☆188Updated last year
- WMI virus, because funny☆281Updated 4 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆121Updated 5 months ago
- ☆100Updated 3 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆74Updated last month
- ☆68Updated 4 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆283Updated last month
- Tool designed to exfiltrate OneDrive Business OCR Data☆114Updated 4 months ago
- (0day) Local Privilege Escalation in IObit Malware Fighter☆139Updated 2 months ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated 11 months ago
- Collection of codes focused on Linux rootkits☆110Updated 3 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆168Updated 3 months ago
- Analyse your malware to surgically obfuscate it☆469Updated last week
- A list of useful tools for Malware Analysis (will be updated regularly)☆141Updated 9 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 3 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆79Updated 3 months ago
- Embed a payload inside a PNG file☆321Updated 7 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆319Updated 3 weeks ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆45Updated 2 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 8 months ago
- macos stealer poc☆114Updated last month
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆144Updated last month
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆165Updated 2 months ago
- ☆257Updated last year
- Offensive Lua.☆185Updated last year
- Payload encoding utility to effectively lower payload entropy.☆116Updated last month
- ☆147Updated last month