malwares / SQL
SQLi Tool/SQL Injection/Hijacker
☆40Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for SQL
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆17Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆30Updated 7 years ago
- Mass malicious script dump/Malware src dump☆15Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆35Updated 7 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆33Updated 7 years ago
- Simple Remote Access Trojan☆20Updated 7 years ago
- Better Remote Access Trojan☆49Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆12Updated 8 years ago
- Miscellaneous exploit code☆19Updated 8 years ago
- Brand New Code Injection for Windows☆12Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Virus RAT v8.0 Beta☆21Updated 7 years ago
- Mirai Botnet DB Project☆25Updated 5 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- Malicious Software SRC Extract☆30Updated last year
- A python3 script that uses cl1p website to send and receive secret messages☆27Updated 4 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 7 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆21Updated 6 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆21Updated 7 years ago
- SideEffect Keylogger☆13Updated 7 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆28Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆51Updated 7 years ago
- PoC Android smart phone botnet☆75Updated 12 years ago
- Mutation Of Vıruses☆50Updated 8 years ago