Source code for the Cascade virus
☆26May 12, 2016Updated 9 years ago
Alternatives and similar repositories for CASCADE
Users that are interested in CASCADE are comparing it to the libraries listed below
Sorting:
- OSINT programs using open data from the city of Los Angeles☆19Jan 26, 2020Updated 6 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- ☆10Aug 9, 2024Updated last year
- Numerous fork bombs in popular programming langs ...☆10May 25, 2017Updated 8 years ago
- This repo contains scripts, frameworks, and other tools related to DDoS.☆36Aug 24, 2019Updated 6 years ago
- A Procedural City Generator script for Maya☆13Aug 7, 2013Updated 12 years ago
- ☆11May 17, 2023Updated 2 years ago
- Notes, code, and wiring diagrams for common audio modules for small electronic projects☆13Oct 30, 2024Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆42Nov 13, 2018Updated 7 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- APK Static Analyzer☆10Dec 4, 2015Updated 10 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- An Escape Room Game about Learning Python☆12Nov 6, 2025Updated 3 months ago
- A lightweight, python implementation of onion routing used by tor. This is a proof of concept where the user enters a web url on the comm…☆12Dec 26, 2022Updated 3 years ago
- This is a script that accesses subreddits and downloads media based on keywords from the submission title.☆13Mar 9, 2020Updated 5 years ago
- Repository for the WACV 2024 paper "PsyMo: A Dataset for Estimating Self-Reported Psychological Traits from Gait"☆13Feb 22, 2024Updated 2 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Pluto - A multi-sport betting bot for Discord☆21Feb 9, 2026Updated 2 weeks ago
- QR code visual cryptography pipeline☆14Jul 7, 2020Updated 5 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language 🐹☆10Jan 17, 2021Updated 5 years ago
- py5 example code and tutorials☆10Nov 22, 2024Updated last year
- Computer art based on joining transparent images☆11Oct 2, 2021Updated 4 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Known WannCrypt Bitcoin addresses☆10Jul 17, 2017Updated 8 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Python scripts using PIL and images2GIF to make animated generative art☆12Sep 2, 2016Updated 9 years ago
- Steganography in Twitter using retweets☆12Jun 19, 2022Updated 3 years ago
- Linux/macOS random/vendor MAC-address changer.☆15Mar 20, 2022Updated 3 years ago
- An example of using the OpenAI API in python to automate email responses☆11Feb 13, 2024Updated 2 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Proof of concept created for 'Reflection Scan: an Off-Path Attack on TCP'.☆11Jan 20, 2012Updated 14 years ago