Malicious computer worm Stuxnet and drivers
☆80Mar 17, 2022Updated 4 years ago
Alternatives and similar repositories for stuxnet
Users that are interested in stuxnet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆238Aug 28, 2024Updated last year
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Dec 11, 2020Updated 5 years ago
- ☆10Oct 1, 2016Updated 9 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Apr 2, 2022Updated 4 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 12 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- 使用Go语言开发的Linux权限审计工具☆13Jun 15, 2022Updated 3 years ago
- ☆11Dec 28, 2021Updated 4 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆18Apr 8, 2022Updated 4 years ago
- The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When …☆27Nov 2, 2016Updated 9 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Compact MBR Bootkit for Windows☆55Jan 13, 2022Updated 4 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- ☆12Apr 5, 2025Updated last year
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 5 years ago
- Taking a new approach to file upload 🚀☆13Dec 12, 2025Updated 4 months ago
- Nessus 一键下载 最新更新脚本☆14Jan 7, 2021Updated 5 years ago
- ☆12Sep 29, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 10 months ago
- ☆37Apr 24, 2022Updated 4 years ago
- ☆19Jul 26, 2019Updated 6 years ago
- Robson is a simple LKM rootkit that uses the Linux kernel's kprobes tracing feature as a hooking mechanism.☆13Feb 16, 2023Updated 3 years ago
- A proof of concept to dump Django website's source code affected by NGINX's off-by-slash alias directive misconfiguration.☆23Dec 8, 2022Updated 3 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Be careful not to infect yourself when accessing and experimenting with malicious software.☆28Oct 25, 2024Updated last year
- ☆24Feb 21, 2016Updated 10 years ago
- ☆19Dec 27, 2019Updated 6 years ago
- Small .exe to batch convert .heic to .jpg; place in any image folder.☆18Sep 25, 2023Updated 2 years ago
- 学习笔记☆13Mar 4, 2022Updated 4 years ago
- A Safer PoC for CVE-2022-22965 (Spring4Shell)☆44May 27, 2022Updated 3 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 3 years ago