Polymorphic ELF Virus
☆18Mar 19, 2022Updated 4 years ago
Alternatives and similar repositories for virus
Users that are interested in virus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Reference DHCP client in go☆10Jul 1, 2024Updated last year
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- An auto-configuring reverse DNS name server☆11Nov 2, 2025Updated 4 months ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆13Sep 28, 2023Updated 2 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- ☆11Apr 10, 2021Updated 4 years ago
- Different AI stuff to IRC bot☆12Oct 10, 2025Updated 5 months ago
- Simple stacking window manager for X11☆11Aug 26, 2020Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- An iproute2 utility written in Go.☆21May 27, 2024Updated last year
- SEQ/Ack signature triggered SSL back connect☆10May 20, 2016Updated 9 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Windows Malware monitors and infects specific kinds of files.☆18Sep 24, 2019Updated 6 years ago
- Ark Cluster Companion Container☆12Aug 24, 2025Updated 7 months ago
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- ☆19Jan 14, 2026Updated 2 months ago
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- EDR PoC WIP LLC☆10Feb 9, 2024Updated 2 years ago
- GENERATE PYTHON BASED FUD STUB☆19Nov 20, 2023Updated 2 years ago
- Next generation of Qubes OS builder☆25Updated this week
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- The Dirty Pipe Vulnerability☆46Mar 8, 2022Updated 4 years ago
- mini script para procurar oq precisa!☆11Feb 2, 2023Updated 3 years ago
- Red team tool that emulates the SolarWinds CI compromise attack vector.☆24Mar 15, 2024Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- DNS Agent serving zones stored in memory, downloaded via HTTP(S) in JSON format☆21Apr 6, 2020Updated 5 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- Send keyboard events with Golang☆21Nov 5, 2023Updated 2 years ago