lu69x / simple-overwrite-mbrLinks
Warning! Don't run this code on your computer.
☆15Updated 6 years ago
Alternatives and similar repositories for simple-overwrite-mbr
Users that are interested in simple-overwrite-mbr are comparing it to the libraries listed below
Sorting:
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 7 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- Carbanak leaked source☆74Updated 7 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- A simple AES malware crypter☆16Updated 7 years ago
- My personal tech blog☆16Updated 8 months ago
- Hive solves a critical problem for the malware operators at the CIA.☆68Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- An0n 3xPloiTeR Shell☆35Updated 5 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Updated 4 years ago
- Golang ransomware☆47Updated 4 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Simple windows backdoor command shell.☆21Updated 7 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Updated 9 years ago
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆136Updated 3 years ago
- Encrypt your git repo...☆48Updated 3 years ago
- Demonstrate about file-less malware approach using JavaScript☆55Updated 8 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- WhatsApp end-to-end media decryptor☆88Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago