lu69x / simple-overwrite-mbrLinks
Warning! Don't run this code on your computer.
☆15Updated 6 years ago
Alternatives and similar repositories for simple-overwrite-mbr
Users that are interested in simple-overwrite-mbr are comparing it to the libraries listed below
Sorting:
- Upload external IP so you can find your devices elsewhere☆16Updated last year
- Generate CIA/NSA style project codenames☆22Updated 8 years ago
- Cross platform system wide proxy server & TLS Interception library for Python☆22Updated 2 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Browser agnostic extension that enables pasting into password fields...☆15Updated 5 years ago
- Golang ransomware☆47Updated 4 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Updated 7 years ago
- Carbanak leaked source☆79Updated 7 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 8 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆64Updated 4 years ago
- ☆18Updated 2 years ago
- A lightweight/secure honeypot using Lua scripts.☆25Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 8 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆19Updated 5 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- ☆24Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 6 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 6 years ago
- ☆70Updated 6 years ago
- WhatsApp end-to-end media decryptor☆93Updated 2 years ago