llarenas / Encryption-malware-in-Python-Links
Encryption malware in Python
☆6Updated 9 years ago
Alternatives and similar repositories for Encryption-malware-in-Python-
Users that are interested in Encryption-malware-in-Python- are comparing it to the libraries listed below
Sorting:
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 9 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 4 months ago
- ☆28Updated 8 years ago
- fast dirtycow implementation with privilege escalation for amd64 in flatassembler.☆6Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- LD_PRELOAD rootkit☆24Updated 10 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 8 years ago
- ☆26Updated 8 years ago
- repository with additional materials and source code☆31Updated 8 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 11 years ago
- Power Loader botnet☆41Updated 10 years ago
- FUD Metasploit Android Payload☆11Updated 9 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Updated 11 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Format string exploit generation☆10Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Updated 9 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Updated 8 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- ☆43Updated 7 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Exploit Reliability Testing System☆34Updated 10 years ago
- Application Security library☆11Updated 12 years ago
- Optional plugins for MITMf☆15Updated 10 years ago