lu69x / simple-overwrite-mbrLinks
Warning! Don't run this code on your computer.
☆15Updated 6 years ago
Alternatives and similar repositories for simple-overwrite-mbr
Users that are interested in simple-overwrite-mbr are comparing it to the libraries listed below
Sorting:
- A Repositories of malicious code (ONLY FOR EDUCATIONAL PURPOSE)☆23Updated 4 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 8 years ago
- Golang ransomware☆46Updated 5 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 6 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆39Updated 10 years ago
- An0n 3xPloiTeR Shell☆35Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- WhatsApp end-to-end media decryptor☆94Updated 2 years ago
- $2100 .Exe to .Doc Exploit (Python)☆52Updated 5 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- Simple windows backdoor command shell.☆20Updated 8 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- Malicious DLL Generator in Py3☆27Updated 5 years ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆148Updated 4 years ago
- ☆24Updated 4 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆30Updated 2 years ago
- recover Firefox and more browsers logins☆49Updated 4 years ago
- We store attacks and exploits that we've found useful in our research☆13Updated 10 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- A PowerShell module that contains different functions that can be used for pranking your fellow co-worker or anyone else for that matter.☆63Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated last year
- Self-healing RAT utilizing libp2p☆88Updated 5 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Updated 2 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 3 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago