nukIeer / stuxnetLinks
Malicious computer worm Stuxnet and drivers
☆78Updated 3 years ago
Alternatives and similar repositories for stuxnet
Users that are interested in stuxnet are comparing it to the libraries listed below
Sorting:
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆80Updated last year
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆64Updated 2 months ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆234Updated last year
- Packet crafting, injection and sniffing tool☆72Updated 4 months ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆63Updated 2 years ago
- Advanced dynamic malware analysis tool.☆83Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆46Updated 4 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 4 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Updated 2 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆40Updated last year
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆80Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆180Updated 3 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆92Updated 9 months ago
- Reverse Shell - technique is commonly used in cyber attacks☆19Updated last year
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆26Updated 6 years ago
- ☆33Updated 2 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 6 months ago
- simple user-mode Rootkit☆107Updated 3 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- ☆39Updated last year
- Attack tool for altering packed samples so that they evade static packing detection☆21Updated 10 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆56Updated 2 months ago
- Antivirus Signature Search Toolkit☆82Updated 2 years ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆38Updated 3 years ago
- Remcos RAT V3.8.0 Latest version☆33Updated 3 years ago