screeck / YouTubeLinks
This repo contains my writeups and code from YouTube videos
☆44Updated 6 months ago
Alternatives and similar repositories for YouTube
Users that are interested in YouTube are comparing it to the libraries listed below
Sorting:
- Malware attacks/techniques explained☆189Updated 3 months ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆80Updated last year
- Malicious computer worm Stuxnet and drivers☆75Updated 3 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆198Updated 2 months ago
- stuxnet Source & Binaries. (+PLC ROOTKIT) ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Sa…☆230Updated last year
- Yes that's what you thinking☆62Updated 3 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆167Updated 4 months ago
- 🧞♂️ malware analysis☆37Updated last year
- ⚠️ malware development☆616Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆79Updated last year
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆60Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆37Updated last year
- A simple implementation of a trojan malware in python☆23Updated 4 years ago
- Here are +200 different rats some with source code☆123Updated 2 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆47Updated 3 years ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆94Updated 11 months ago
- Windows Hacking FrameWork using Reverse Shell☆105Updated 7 months ago
- An advanced Ransomware written in C++ and fully customizable☆95Updated 2 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆29Updated 2 years ago
- The LockBit builder files☆136Updated last year
- ☆69Updated 4 years ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆30Updated 4 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆158Updated 2 years ago
- What the name says....☆99Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 9 months ago
- ☆123Updated last year
- A collection of malwares found on the internet.☆64Updated 2 years ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆85Updated 5 months ago
- Repo for the UEFI Development Series☆66Updated 2 months ago