screeck / YouTubeLinks
This repo contains my writeups and code from YouTube videos
☆40Updated 3 months ago
Alternatives and similar repositories for YouTube
Users that are interested in YouTube are comparing it to the libraries listed below
Sorting:
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆188Updated 4 months ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆77Updated last year
- Malware attacks/techniques explained☆177Updated 2 weeks ago
- Malicious computer worm Stuxnet and drivers☆65Updated 3 years ago
- What the name says....☆101Updated 10 months ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- A reverse shell for Windows and Linux written in C.☆77Updated 3 years ago
- ☆68Updated 3 years ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆218Updated 10 months ago
- 🧞♂️ malware analysis☆37Updated last year
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated last month
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆164Updated last month
- A simple script to automate systemd backdoor☆25Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆36Updated last year
- The LockBit builder files☆125Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆83Updated 4 months ago
- Public repository containing materials for various malware-related streams.☆36Updated last week
- Yes that's what you thinking☆63Updated 3 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆111Updated last year
- ☆123Updated last year
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Updated 3 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆50Updated 4 months ago
- An advanced Ransomware written in C++ and fully customizable☆93Updated last year
- A spy pixel which can be emedded into web pages or emails.☆101Updated 11 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆72Updated last month
- Cybersecurity research results. Simple C/C++ and Python implementations☆246Updated this week
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆87Updated 8 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated 6 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆37Updated last year
- Here are +200 different rats some with source code☆105Updated last year