This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!
☆13Jun 6, 2021Updated 4 years ago
Alternatives and similar repositories for Malware_Society
Users that are interested in Malware_Society are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- In this we will start from the bottom of coding..☆10Jun 18, 2021Updated 4 years ago
- It's a bash (unix shell) encrypted, mutant and polymorphic virus.☆10Aug 23, 2022Updated 3 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Feb 14, 2023Updated 3 years ago
- This tool will allows u to deauth or kick off an specific device from an given AP☆25Aug 29, 2022Updated 3 years ago
- Reconstruction and analysis of viral and host genomes at multi-organ level☆21Mar 19, 2026Updated last week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A pipeline for viral identification from metagenomic samples☆27Oct 15, 2017Updated 8 years ago
- Infect Android Phone☆10Jun 21, 2023Updated 2 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Bash script that backs up Docker images or containers, and then scans them using VirusTotal.☆16May 2, 2023Updated 2 years ago
- GDI malware☆10Jul 13, 2021Updated 4 years ago
- Find all hostnames related to a given domain. Helpful during VA/PT work.☆16May 1, 2022Updated 3 years ago
- Infect Any Android Device With Virus From Link In Termux☆11Oct 1, 2023Updated 2 years ago
- How to Convert Bitcoin-PUBKEY HEX Public Keys to Base58 Bitcoin Address and Check Balance for BTC Coins☆11Aug 26, 2022Updated 3 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- VAPiD: Viral Annotation and Identification Pipeline☆56May 29, 2024Updated last year
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- ☆14Dec 3, 2020Updated 5 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- hacking tool☆32Jan 14, 2026Updated 2 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- A Nmap script optimized for Hack the Box and CTFs☆14Feb 22, 2021Updated 5 years ago
- Does a dictionary lookup on common, valuable hostnames for a given domain.☆26May 1, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- 📞 First ever OTP Bot maker for beginners. Generate your own OTP source in python or nodejs with any features you like!☆10Apr 21, 2023Updated 2 years ago
- A swiss army knife for pentesting networks☆24Mar 16, 2023Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆14Sep 30, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- OwOwning with the Windows API Examples and Code. DEFCON Furs 2020 presentation.☆13Jan 18, 2024Updated 2 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- «MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin …☆14Dec 7, 2022Updated 3 years ago
- Portable download of Microsoft Visual C++ 4.00 command line tools. Just run bin/VCVARS32.bat in any command prompt.☆14Nov 2, 2021Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆10Jun 18, 2020Updated 5 years ago