Polymorphic ELF Virus
☆18Mar 19, 2022Updated 4 years ago
Alternatives and similar repositories for virus
Users that are interested in virus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆14Sep 28, 2023Updated 2 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- ☆11Apr 10, 2021Updated 5 years ago
- Different AI stuff to IRC bot☆13Oct 10, 2025Updated 6 months ago
- Simple stacking window manager for X11☆11Aug 26, 2020Updated 5 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- Ark Cluster Companion Container☆12Aug 24, 2025Updated 7 months ago
- Windows process injection methods☆19Jul 18, 2021Updated 4 years ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- ☆19Jan 14, 2026Updated 3 months ago
- A file-based IRC client inspired by ii☆39Mar 10, 2026Updated last month
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- Runs nmap on the LAN and then generates a basic ASCII network diagram, a 'hand drawn' network diagram and an bootstrap themed web report …☆23Feb 12, 2026Updated 2 months ago
- Next generation of Qubes OS builder☆25Updated this week
- Windows NTLM Authentication Backdoor☆18Jan 27, 2022Updated 4 years ago
- The Dirty Pipe Vulnerability☆46Mar 8, 2022Updated 4 years ago
- GENERATE PYTHON BASED FUD STUB☆20Nov 20, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Mar 15, 2024Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Jul 29, 2022Updated 3 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform au…☆18May 1, 2024Updated last year
- A simple BOF (Beacon Object File) to search files in the system☆16Dec 2, 2023Updated 2 years ago
- Privilege Escalation Windows 11 24H2☆14Apr 14, 2025Updated last year
- LD_PRELOAD rootkit☆139Feb 29, 2024Updated 2 years ago