screeck / YouTube
This repo contains my writeups and code from YouTube videos
☆36Updated last month
Alternatives and similar repositories for YouTube
Users that are interested in YouTube are comparing it to the libraries listed below
Sorting:
- Malware attacks/techniques explained☆129Updated 3 weeks ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆73Updated 11 months ago
- Yes that's what you thinking☆63Updated 2 years ago
- What the name says....☆95Updated 8 months ago
- Malicious computer worm Stuxnet and drivers☆64Updated 3 years ago
- 🧞♂️ malware analysis☆35Updated last year
- ☆122Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆157Updated 7 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 10 months ago
- A spy pixel which can be emedded into web pages or emails.☆97Updated 9 months ago
- ⚠️ malware development☆543Updated 11 months ago
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆36Updated last year
- Malware Development for Ethical Hackers, published by Packt☆319Updated 5 months ago
- A simple Reverse Engineering challenge for starter in Reverse Engineering Attack to understand the basic concept of Reverse Engineering &…☆84Updated 6 months ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- ☆38Updated 3 years ago
- 「💽」MBR Overwrite malware for linux☆26Updated 5 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆177Updated 2 months ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆40Updated 3 years ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 4 months ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆37Updated 6 months ago
- This repository contains a collection of code examples and tutorials for programming in x86 assembly language☆31Updated last year
- An advanced Ransomware written in C++ and fully customizable☆88Updated last year
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆43Updated last month
- Just a simple ransomware in python with a command and control server (C2) that is running flask☆27Updated 3 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆28Updated 2 years ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆97Updated 10 months ago