screeck / YouTubeLinks
This repo contains my writeups and code from YouTube videos
☆39Updated 3 months ago
Alternatives and similar repositories for YouTube
Users that are interested in YouTube are comparing it to the libraries listed below
Sorting:
- Malware attacks/techniques explained☆169Updated this week
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆35Updated 11 months ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆77Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 4 months ago
- rootkit for tryhackme king of the hill☆12Updated last year
- A Remote Administration Tool (RAT) for Windows written in C++ with a fancy C.L.I.☆60Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- POC | Steal user WhatsApp information/data☆65Updated last month
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated 3 weeks ago
- A simple script to automate systemd backdoor☆24Updated 2 years ago
- A spy pixel which can be emedded into web pages or emails.☆101Updated 10 months ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 11 months ago
- What the name says....☆98Updated 9 months ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆58Updated last year
- Yes that's what you thinking☆63Updated 3 years ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆37Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆31Updated 2 years ago
- Fairly Undetectable Linux Spyware☆18Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 2 months ago
- Tool to evade Antivirus With Different Techniques☆182Updated last year
- ☆40Updated 3 years ago
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆26Updated 11 months ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 3 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆101Updated 11 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆68Updated this week
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- Anti-forensics tool Inspired by NSA's Marble framework.☆9Updated 2 months ago
- ☆122Updated last year
- execute PE in memory Filelessly☆43Updated 4 months ago