kurobeats / old-school-viruses
This is a collection of really old (mid 90s) virus source code
☆25Updated 7 years ago
Alternatives and similar repositories for old-school-viruses:
Users that are interested in old-school-viruses are comparing it to the libraries listed below
- ☆29Updated 4 years ago
- Minimal keylogger written in C, remote upload of keystrokes and screen snapshots!☆28Updated 7 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆33Updated 8 years ago
- Collection of computer virus source code for research purpose.☆8Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆33Updated 8 years ago
- A copy of articles published at Peerlyst☆38Updated 8 years ago
- flood area with fake essids☆20Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- Interface for the Shodan Computer Search Engine API☆23Updated 4 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆25Updated 4 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- ☆58Updated 7 years ago
- A small TOR Onion Address harvester for checking if the address is available or not.☆77Updated 6 years ago
- AES Ransomware in batch☆11Updated 8 months ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- This software was coded for people to study keyloggers and other virus for windows operating system.☆10Updated 8 years ago
- This version touches disk for registry persistence.☆25Updated 9 years ago
- This is most dangerous botnet. No Spread needed. botnet infecting cctv,dvr etc.☆29Updated 8 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 8 years ago
- Quick and simple alghorithm to search in leaks very fast mode☆11Updated 5 years ago
- An HTML/Javascript Silent Miner... Simple html page I made that contains the famous Monero Miner Coin Hive, the miner start without user …☆48Updated 7 months ago
- Man-in-the-middle against Tor bridges☆26Updated 5 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Updated 4 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 8 years ago