hiteshsahu / Virus-Vault
Collection of computer virus source code for research purpose.
☆8Updated 8 years ago
Alternatives and similar repositories for Virus-Vault:
Users that are interested in Virus-Vault are comparing it to the libraries listed below
- ☆15Updated 3 years ago
- Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.☆31Updated 3 years ago
- A semi-automatic osint/recon framework.☆24Updated 9 months ago
- simple javascript keylogger google chrome☆8Updated 4 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- A simple Golang program to collect proxies☆12Updated 5 years ago
- Scripts for pentesting/hacking☆16Updated 3 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated 4 months ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- first commit☆10Updated 8 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆13Updated 3 years ago
- An Chat Program for use with the ToorCon 2013 badge.☆21Updated 12 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Updated 4 years ago
- A first look at browser-based Cryptojacking☆15Updated 6 years ago
- An advanced reverse shell written in Python3.☆21Updated 4 years ago
- Apple BLE research☆30Updated 5 years ago
- Subdomain crawler with wordlist using python☆12Updated 4 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- 😈 The Demon App Store☆29Updated 3 years ago
- Access Windows 10 without password☆13Updated 4 years ago
- ☆13Updated 4 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- BDsploit (Big Data Exploitation and Post-exploitation Toolkit)☆5Updated last year
- pen testing scripts☆11Updated 4 years ago
- ransomware encrypte all filles,disque C,disque D,Usb ...etc, filles can not be decrypted☆17Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- Repository of tools used in my blog☆50Updated 11 months ago
- VPN based on TOR Network for your Linux based distro☆9Updated 4 years ago