Polymorphic Virus in Python
☆10Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for Polymorphic-Virus-Python
Users that are interested in Polymorphic-Virus-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Polymorphic virus and anitvirus software for information security team project.☆20Apr 13, 2019Updated 6 years ago
- Python Virus!☆10Mar 16, 2023Updated 3 years ago
- :+1: Useful shell scripts in one place☆13Dec 30, 2025Updated 2 months ago
- A python metamorphic engine for PE/PE+ files.☆15Jan 1, 2023Updated 3 years ago
- SubGhz remote for WatchFire gas station signs☆22May 3, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A file system that mutates files☆14Jul 20, 2020Updated 5 years ago
- PEMEncrypt is a cross-platform PowerShell module handling string encryption and decryption using RSA keys only.☆23Aug 24, 2019Updated 6 years ago
- Simple polymorphic virus written in Python for the "Malware analysis and Design" Master course in University of Verona☆35May 25, 2016Updated 9 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆22Mar 6, 2019Updated 7 years ago
- A cross-platform notes in the form of card record.☆10Apr 11, 2023Updated 2 years ago
- A C++ library to build Polymorphic Viruses.☆10Oct 30, 2023Updated 2 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- ☆24Feb 26, 2026Updated 3 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Polymorphic ELF Virus☆18Mar 19, 2022Updated 4 years ago
- Design a Telegram Bot that will interact with truck drivers to track your shipments and provide real-time visibility of your transportati…☆25Dec 30, 2025Updated 2 months ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Implementation of the Findex searchable encryption scheme☆17Mar 13, 2026Updated last week
- Fileless Ransomware Example☆38Aug 2, 2017Updated 8 years ago
- A simple mobile chat application, made with .NET MAUI for the mobile app, and an ASP.NET Core Web API as backend service. The app uses Si…☆19May 22, 2024Updated last year
- A telegram bot to create and manage a bitcoin wallet. Fast, open-source and commission-free !☆21Mar 30, 2020Updated 5 years ago
- Compilation of ELF Packers and ELF obfuscation / Anti-Debugging stuff☆21Nov 19, 2017Updated 8 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- A Webradio Android App - templated from R/a/dio app☆12Jan 16, 2026Updated 2 months ago
- Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!☆27Nov 17, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- 💬 Lightweight ChatGPT to Telegram Bot☆29Mar 6, 2023Updated 3 years ago