pulpocaminante / StuxnetLinks
WMI virus, because funny
☆300Updated 11 months ago
Alternatives and similar repositories for Stuxnet
Users that are interested in Stuxnet are comparing it to the libraries listed below
Sorting:
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆321Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆270Updated last year
- A list of public attacks on BitLocker☆401Updated 4 months ago
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆608Updated last week
- SetupHijack is a security research tool that exploits race conditions and insecure file handling in Windows applications installer and up…☆261Updated 3 months ago
- ☆157Updated 8 months ago
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆579Updated 3 months ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 11 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 8 months ago
- ☆71Updated 11 months ago
- A repo for TPM sniffing greatness☆242Updated 2 weeks ago
- Direct access to NTFS volumes☆292Updated 3 months ago
- Evasion by machine code de-optimization.☆412Updated last year
- This is practice VM for malware development☆170Updated last month
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆335Updated 6 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- A delicious, but malicious SSL-VPN server 🌮☆257Updated 2 months ago
- A Windows Named Pipe Multi-tool / Proxy☆217Updated 3 weeks ago
- Generate a proxy dll for arbitrary dll☆217Updated last year
- Offensive Lua.☆218Updated last month
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- Generate backdoored RSA keys using SETUP☆222Updated 3 weeks ago
- Collection of codes focused on Linux rootkits☆188Updated 2 months ago
- Analyse your malware to surgically obfuscate it☆511Updated 2 weeks ago
- WinVisor - A hypervisor-based emulator for Windows x64 user-mode executables using Windows Hypervisor Platform API☆626Updated 11 months ago
- A GUI and CLI tool for removing bloat from executables☆436Updated 5 months ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆395Updated 2 years ago
- Inject DLLs into the explorer process using icons☆397Updated 7 months ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆312Updated last year