hiteshsahu / Virus-VaultLinks
Collection of computer virus source code for research purpose.
☆8Updated 9 years ago
Alternatives and similar repositories for Virus-Vault
Users that are interested in Virus-Vault are comparing it to the libraries listed below
Sorting:
- ☆15Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Scripts for pentesting/hacking☆17Updated 3 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆31Updated 3 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Learning-Pentesting-With-Python☆21Updated 6 years ago
- Captive Portal Attack Tool☆8Updated 4 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated last year
- Phishing can't get any easier with Tilapia☆11Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Wordlists generated over the years of penetration testing☆12Updated 3 months ago
- Other tools developed by CIRT.net☆23Updated 4 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 3 months ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- This is a collection of really old (mid 90s) virus source code☆26Updated 8 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆13Updated last year
- pen testing scripts☆12Updated 4 years ago
- Complete C99 parser in pure Python☆10Updated 4 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆12Updated 3 years ago
- Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overf…☆18Updated 4 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Updated 7 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Pentest ToolKit☆28Updated 5 years ago
- A semi-automatic osint/recon framework.☆24Updated last year
- An opensource Prank Startup Malware for windows developed using C Programming Language.☆23Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆17Updated 2 years ago
- Arduino's version of Rubber ducky project watched in mr robot (based on https://www.hak5.org/blog/15-second-password-hack-mr-robot-style)☆34Updated 7 years ago