screeck / YouTubeLinks
This repo contains my writeups and code from YouTube videos
☆54Updated 10 months ago
Alternatives and similar repositories for YouTube
Users that are interested in YouTube are comparing it to the libraries listed below
Sorting:
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆85Updated last year
- Malicious computer worm Stuxnet and drivers☆79Updated 3 years ago
- Malware attacks/techniques explained☆205Updated 7 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆213Updated 6 months ago
- x86-assembly-cheat-sheet: A must-have for quick reference in x86 Assembly. Covers fundamental concepts, instruction sets, & mem managemen…☆53Updated last year
- A reverse shell for Windows and Linux written in C.☆86Updated 3 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated 8 months ago
- A spy pixel which can be emedded into web pages or emails.☆107Updated last year
- 🧞♂️ malware analysis☆38Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆108Updated last year
- What the name says....☆104Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆42Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆169Updated 8 months ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆53Updated 4 years ago
- Generate a reverse shell macro for Word documents.☆38Updated 3 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆68Updated 2 months ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆236Updated last year
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆101Updated last year
- PasteBomb C2-less RAT☆318Updated 3 months ago
- ☆69Updated 4 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 11 months ago
- C++ Programming for Hackers☆63Updated this week
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆66Updated 9 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- Repo for the UEFI Development Series☆72Updated 5 months ago
- 「💽」MBR Overwrite malware for linux☆28Updated last year
- Collection of codes focused on Linux rootkits☆195Updated 3 months ago
- ☆125Updated last year
- CVE-2025-56383-Proof-of-Concept☆55Updated 4 months ago