blackmassgroup / minegriefLinks
Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect.
☆120Updated 6 months ago
Alternatives and similar repositories for minegrief
Users that are interested in minegrief are comparing it to the libraries listed below
Sorting:
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆299Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆113Updated 5 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆74Updated 2 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 2 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆81Updated 4 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆124Updated 5 months ago
- Unorthodox and stealthy way to inject a DLL into the explorer using icons☆320Updated last month
- ☆67Updated 4 months ago
- Offensive Lua.☆188Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.☆282Updated 11 months ago
- ☆189Updated last year
- ☆135Updated 2 weeks ago
- macos stealer poc☆117Updated 2 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- ☆356Updated last year
- Windows Kernel Mode Rootkit☆55Updated 2 months ago
- Analyse your malware to surgically obfuscate it☆477Updated 3 weeks ago
- Slides & Code snippets for a workshop held @ x33fcon 2024☆260Updated last year
- WMI virus, because funny☆282Updated 4 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆63Updated 2 months ago
- ☆149Updated 2 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆176Updated last year
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆285Updated 2 months ago
- ☆133Updated 3 months ago
- Windows rootkit designed to work with BYOVD exploits☆200Updated 5 months ago
- ☆258Updated last year
- 🧞♂️ malware analysis☆36Updated last year
- Collection of codes focused on Linux rootkits☆131Updated 2 weeks ago
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.☆135Updated last year