screeck / YouTube
This repo contains my writeups and code from YouTube videos
☆36Updated last month
Alternatives and similar repositories for YouTube:
Users that are interested in YouTube are comparing it to the libraries listed below
- Malware attacks/techniques explained☆119Updated 2 months ago
- 🧞♂️ malware analysis☆36Updated last year
- Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect …☆63Updated 3 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆75Updated 10 months ago
- rootkit for tryhackme king of the hill☆12Updated last year
- A simple script to automate systemd backdoor☆23Updated 2 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆40Updated last month
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆47Updated last year
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆154Updated 3 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆75Updated 2 months ago
- capNcook - a dark web exploration tool☆99Updated 6 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆35Updated last year
- What the name says....☆94Updated 7 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆115Updated last year
- ☆121Updated last year
- This is not a crack and not a reverse either. Lockbit RW Source codes have been completely leaked. I'm sharing it so that you don't pay f…☆27Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆85Updated last year
- Here are +200 different rats some with source code☆93Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆156Updated 6 months ago
- ☆38Updated 3 years ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated this week
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆72Updated last year
- ☆8Updated 9 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 6 months ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 3 weeks ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆42Updated this week
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆81Updated 5 months ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆67Updated 3 weeks ago