mibeh / VTDownloaderLinks
A command-line tool written in Python 3 to download files from VirusTotal
☆15Updated 6 years ago
Alternatives and similar repositories for VTDownloader
Users that are interested in VTDownloader are comparing it to the libraries listed below
Sorting:
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated 2 years ago
- ☆19Updated 3 years ago
- Advanced dynamic malware analysis tool.☆82Updated 2 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆47Updated 3 years ago
- ☆32Updated 2 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆15Updated 2 years ago
- Decompiled NotPetya File Encryptor Code☆17Updated 3 years ago
- a small wiper malware programmed in c#☆59Updated 3 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Obfuscator for batch script☆62Updated last year
- Conti Ransomware Source Code☆19Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Updated 4 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Updated 2 years ago
- Get-UnJlaive is tool which is able to reconstruct Jlaive (.NET Antivirus Evasion Tool (Exe2Bat)) to original Assembly and stub Assembly.☆22Updated 3 years ago
- Collaborative malware exchange repository.☆34Updated last year
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- web based c2 🏴☠️☆15Updated last year
- Reversed source code to the Babuk ransomware builder.☆17Updated 4 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆84Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆65Updated last month
- Ransomware written in go, encrypt - decrypt.☆29Updated 9 months ago
- Unpacker and Config Extractor for managed Redline Stealer payloads☆41Updated 2 years ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆46Updated 4 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆28Updated 9 months ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 4 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆63Updated 2 years ago