lu69x / simple-overwrite-mbrLinks
Warning! Don't run this code on your computer.
☆15Updated 6 years ago
Alternatives and similar repositories for simple-overwrite-mbr
Users that are interested in simple-overwrite-mbr are comparing it to the libraries listed below
Sorting:
- Cryptographic Dataset Generation & Modelling Framework☆41Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆23Updated 2 years ago
- $2100 .Exe to .Doc Exploit (Python)☆52Updated 5 years ago
- Simple windows backdoor command shell.☆20Updated 8 years ago
- Golang ransomware☆46Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Automatically exported from code.google.com/p/hookme☆14Updated 10 years ago
- WhatsApp end-to-end media decryptor☆94Updated 2 years ago
- Automated Cyber Offense☆88Updated 6 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Updated 4 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆49Updated 3 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- recover Firefox and more browsers logins☆49Updated 4 years ago
- Malicious DLL Generator in Py3☆27Updated 5 years ago
- Network and web related exploratory playground.☆19Updated 9 years ago
- A fast and advanced ransomware PoC☆60Updated 10 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- ☆18Updated 2 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated last year
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 9 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 8 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Updated 4 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated last week
- Public open-source code of malware Shamoon (aka Disttrack).☆39Updated 10 years ago
- Handy script to automate the attack☆22Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago