screeck / YouTube
This repo contains my writeups and code from YouTube videos
☆33Updated 3 months ago
Alternatives and similar repositories for YouTube:
Users that are interested in YouTube are comparing it to the libraries listed below
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆112Updated 3 years ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆75Updated 7 months ago
- Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect …☆56Updated 2 years ago
- WannaCry decompiled source code☆80Updated 2 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆151Updated 3 months ago
- 「💽」MBR Overwrite malware for linux☆26Updated last month
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆66Updated 4 months ago
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆46Updated 10 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆92Updated 6 months ago
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆31Updated 2 years ago
- An advanced Ransomware written in C++ and fully customizable☆85Updated last year
- Ransomware hello kitty☆22Updated 3 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆114Updated last month
- rootkit for tryhackme king of the hill☆12Updated 9 months ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆36Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆38Updated 3 months ago
- 🧞♂️ malware analysis☆32Updated 10 months ago
- ☆93Updated 3 months ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Repo for the UEFI Development Series☆44Updated last week
- Windows Hacking FrameWork using Reverse Shell☆101Updated last week
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆66Updated 10 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆25Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆27Updated 2 months ago
- Here are +200 different rats some with source code☆85Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆129Updated last year
- List of payloads: reverse shell, bind shell, webshell.☆29Updated last year
- Malware and malicious applications database☆37Updated 7 months ago
- ☆120Updated 10 months ago