malwares / SQLLinks
SQLi Tool/SQL Injection/Hijacker
☆45Updated 8 years ago
Alternatives and similar repositories for SQL
Users that are interested in SQL are comparing it to the libraries listed below
Sorting:
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Simple Remote Access Trojan☆23Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Mutation Of Vıruses☆49Updated 9 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆32Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Virus RAT v8.0 Beta☆24Updated 8 years ago
- Malicious Software SRC Extract☆31Updated 2 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Windows Remote Administration Tool via Telegram☆34Updated 8 years ago
- Mass malicious script dump/Malware src dump☆16Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Miscellaneous exploit code☆20Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 9 years ago
- some python3 functions to add spreading features to any python backdoor☆54Updated 8 years ago
- Mirai Botnet DB Project☆26Updated 6 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Graphical user interface for the windows version of THC Hydra☆53Updated 7 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- HTTP botnet☆62Updated 9 years ago
- Brand New Code Injection for Windows☆12Updated 8 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. I have created this repository to make the access for study as easy…☆22Updated 8 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- SideEffect Keylogger☆13Updated 8 years ago