screeck / YouTubeLinks
This repo contains my writeups and code from YouTube videos
☆43Updated 6 months ago
Alternatives and similar repositories for YouTube
Users that are interested in YouTube are comparing it to the libraries listed below
Sorting:
- Malware attacks/techniques explained☆186Updated 2 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆198Updated 2 months ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆81Updated last year
- Malicious computer worm Stuxnet and drivers☆73Updated 3 years ago
- ⚠️ malware development☆610Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆166Updated 4 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆104Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆46Updated 3 years ago
- ☆123Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 9 months ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 3 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆42Updated last year
- What the name says....☆99Updated last year
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆225Updated last year
- PasteBomb C2-less RAT☆318Updated 10 months ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆60Updated last year
- Repo for the UEFI Development Series☆66Updated last month
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆113Updated last year
- Malware Development for Ethical Hackers, published by Packt☆376Updated 9 months ago
- ☆69Updated 4 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Updated 4 years ago
- Commands and Scripts to attack Linux and Servers☆35Updated 4 months ago
- 🧞♂️ malware analysis☆37Updated last year
- The LockBit builder files☆135Updated last year
- Challenges, flags, solvers and writeups for the Securinets INSAT Friendly CTF edition 2024.☆19Updated 11 months ago
- A simple implementation of a trojan malware in python☆23Updated 4 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆40Updated 11 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆85Updated 6 months ago