hiteshsahu / Virus-Vault
Collection of computer virus source code for research purpose.
☆8Updated 8 years ago
Alternatives and similar repositories for Virus-Vault:
Users that are interested in Virus-Vault are comparing it to the libraries listed below
- ☆15Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆21Updated 12 years ago
- flood area with fake essids☆21Updated 7 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆25Updated 4 years ago
- Scripts for pentesting/hacking☆16Updated 3 years ago
- Python Reverse Shell Builder with some advanced functionalities☆12Updated 4 years ago
- AES Ransomware in batch☆11Updated 9 months ago
- Other tools developed by CIRT.net☆23Updated 4 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- ARP Man-in-the-Middle tool☆29Updated 3 months ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- A semi-automatic osint/recon framework.☆24Updated 10 months ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated last year
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Open-source advanced cracking tool made in Electron.JS☆16Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆9Updated 7 years ago
- 😈 The Demon App Store☆29Updated 3 years ago
- A simple Golang program to collect proxies☆12Updated 5 years ago
- Malware USB Spread | POC | Example☆9Updated 6 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Discord Scripts☆12Updated 5 years ago
- ☆29Updated 4 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Polkit D-Bus Authentication Bypass Exploit☆10Updated 3 years ago
- Phishing can't get any easier with Tilapia☆11Updated 2 years ago
- Automated Mass Exploiter☆12Updated 5 years ago