A Stuxnet clone made in Python for a research project
☆14Sep 9, 2019Updated 6 years ago
Alternatives and similar repositories for stuxnet
Users that are interested in stuxnet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious computer worm Stuxnet and drivers☆80Mar 17, 2022Updated 4 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆21Jul 11, 2021Updated 4 years ago
- fuchsia os kernel zircon clone☆17Dec 31, 2018Updated 7 years ago
- ☆17Jun 22, 2023Updated 2 years ago
- A cheap mesoscopic light sheet and optical projection tomography microscope☆13Mar 20, 2023Updated 3 years ago
- Android MultiCamera Camera2 API Demo☆20Jul 29, 2019Updated 6 years ago
- Totem maltego transform☆29Sep 23, 2020Updated 5 years ago
- NIPA clone☆13Mar 17, 2026Updated last week
- VAginaL community state typE Nearest CentroId clAssifier☆23Apr 18, 2023Updated 2 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Receiving OSC messages via the Autopilot class to fly the AR Parrot drone☆15Feb 2, 2014Updated 12 years ago
- A Crawler That Crawls Email Addresses From Various Sources! Ex: pastebin, github, paste ubuntu e.t.c☆11Sep 10, 2018Updated 7 years ago
- Data Analysis using Python☆10Mar 4, 2024Updated 2 years ago
- Save & share Bard conversations. Discover & use Bard prompts. Enhance Bard with more features.☆13May 26, 2023Updated 2 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- آموزش برنامه نویسی شئ گرایی در پایتون☆11Aug 9, 2022Updated 3 years ago
- PowerShell wrapper for nmap, allows easy scanning of many hosts and subnets☆15Apr 1, 2018Updated 7 years ago
- Fix for iOS 13+ WiFi name bug found in June 2021☆12Jul 15, 2021Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆12May 17, 2019Updated 6 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Jul 9, 2025Updated 8 months ago
- Host your own Lightning Address (see https://lightningaddress.com)☆32Oct 10, 2025Updated 5 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- This research analyze the binary options market on EURUSD M1, M5 and M15 timeframes with data gotten from Metatrader 5☆12Jul 12, 2021Updated 4 years ago
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Jul 12, 2021Updated 4 years ago
- Discover which of your Facebook friends are on Tinder!☆16Oct 10, 2022Updated 3 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- ☆12Jan 31, 2020Updated 6 years ago
- a powerful bot which increase your Instagram followers☆14Apr 23, 2023Updated 2 years ago
- A support library for Ronin. Like activesupport, but for hacking!☆28Jan 15, 2026Updated 2 months ago
- WARZONE RAT 1.71 CRACKED by UNKNOWN-Remote Administration Trojan-RAT☆14Aug 11, 2020Updated 5 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated 2 months ago
- Tools used in our 34C3 talk, DPRK Consumer Technology☆18Dec 27, 2017Updated 8 years ago
- Calculate the number of nuclear reactors needed for the energy wasted by cryptocurrency mining☆11Mar 8, 2025Updated last year
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago