blackmassgroup / minegriefLinks
Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encrypting Minecraft worlds, and phishing players who connect.
☆122Updated 10 months ago
Alternatives and similar repositories for minegrief
Users that are interested in minegrief are comparing it to the libraries listed below
Sorting:
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated last year
- macos stealer poc☆129Updated 4 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 7 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 9 months ago
- ☆158Updated 5 months ago
- WMI virus, because funny☆296Updated 9 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆56Updated last month
- BSides Prishtina 2024 Malware Development and Persistence workshop☆113Updated 5 months ago
- Offensive Lua.☆214Updated last week
- 🧞♂️ malware analysis☆37Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆61Updated last week
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆86Updated 9 months ago
- ☆164Updated 8 months ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆141Updated 10 months ago
- ☆71Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 6 months ago
- Collection of codes focused on Linux rootkits☆185Updated 3 weeks ago
- ☆154Updated 6 months ago
- A reverse shell for Windows and Linux written in C.☆78Updated 3 years ago
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆254Updated last month
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- This is practice VM for malware development☆134Updated last week
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆63Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆252Updated last month
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- Polymorphic Command & Control☆100Updated 8 months ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆262Updated 6 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆31Updated 3 years ago