kurobeats / old-school-viruses
This is a collection of really old (mid 90s) virus source code
☆24Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for old-school-viruses
- Trickbot configuration repository☆8Updated 6 years ago
- This is not a real botnet, this is suppose to show how botnets work, no virus, just simple python code.☆16Updated 7 years ago
- The pattern matching swiss knife☆14Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆58Updated 7 years ago
- A copy of articles published at Peerlyst☆37Updated 8 years ago
- Talos Decryptor POC for Remcos RAT version 2.0.5 and earlier☆23Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆30Updated 8 years ago
- Automated Cyber Offense☆88Updated 5 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- This software was coded for people to study keyloggers and other virus for windows operating system.☆10Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆12Updated 8 years ago
- Eternalblue & DoublePulsar scanner☆19Updated 7 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- Man-in-the-middle against Tor bridges☆25Updated 4 years ago
- Collection of computer virus source code for research purpose.☆8Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 7 years ago
- Mass malicious script dump/Malware src dump☆15Updated 8 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Updated 4 months ago
- A tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, crede…☆19Updated 6 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- Uptime checker for tor hidden services☆12Updated 6 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A curated list of awesome Security Hardening techniques for Windows.☆19Updated 7 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆42Updated 2 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆45Updated 6 years ago
- Pentest ToolKit☆27Updated 4 years ago
- Security Advisories and Researches☆15Updated 10 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆51Updated 2 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆33Updated 8 years ago