llarenas / Encryption-malware-in-Python-
Encryption malware in Python
☆6Updated 9 years ago
Alternatives and similar repositories for Encryption-malware-in-Python-:
Users that are interested in Encryption-malware-in-Python- are comparing it to the libraries listed below
- Win32 Python code for tracing malware activities on infected hosts☆26Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆30Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- Exception detector for windows programs(x86 only)☆11Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated 11 months ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆28Updated 8 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- Various tools, exploits and other short code snippets☆12Updated 6 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Updated 10 years ago
- fun rootkits stuff!☆18Updated 9 years ago
- My metasploit modules☆22Updated 9 years ago
- Exploit kit analyzer☆21Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Spy Agency Teasing☆14Updated 10 years ago
- Malware analyses and helpful scripts☆29Updated 2 years ago
- A backdoor socket that takes commands from a client and executes them in the server machine☆9Updated 7 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Shellcode tracer☆15Updated 8 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 10 years ago
- fast dirtycow implementation with privilege escalation for amd64 in flatassembler.☆6Updated 8 years ago
- distributed www CMS spyder☆8Updated 7 years ago
- ☆27Updated 2 years ago
- ☆32Updated 8 months ago
- Here comes the paintrain!☆11Updated 8 years ago
- ☆23Updated 9 years ago