nullsecuritynet / toolsLinks
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
☆60Updated last week
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- A 2-in-1 toolset of https://github.com/x0rz/EQGRP_Lost_in_Translation and https://github.com/x0rz/EQGRP☆25Updated 6 years ago
- ☆37Updated 6 months ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- Antivirus Signature Search Toolkit☆80Updated 2 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆31Updated 4 months ago
- using the gpu to hide your payload☆59Updated 3 years ago
- Hellokitty Ransomware Source Code☆16Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- ☆45Updated 11 months ago
- ☆17Updated 6 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆46Updated 3 years ago
- Cross-platform RAT, written in C☆87Updated 2 years ago
- Malware Libraries focused in help Malware Development☆24Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- 「🧊」Ring 3 Rootkit for Windows 10☆58Updated 9 months ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆15Updated 5 months ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆28Updated 2 years ago
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Updated last year
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆18Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆31Updated 5 years ago
- ☆12Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆28Updated last year
- Ransomware written in go, encrypt - decrypt.☆29Updated 4 months ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆40Updated 3 years ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆17Updated 9 months ago