Codes for malware, viruses and key-logger and other tools
☆37Aug 14, 2021Updated 4 years ago
Alternatives and similar repositories for Ethical-Hacking
Users that are interested in Ethical-Hacking are comparing it to the libraries listed below
Sorting:
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- Simple Packer PE File☆16Mar 8, 2019Updated 6 years ago
- ☆21May 3, 2020Updated 5 years ago
- ☆31Feb 15, 2016Updated 10 years ago
- Source Code for 'Beginning Ethical Hacking with Kali Linux' by Sanjib Sinha☆30Dec 3, 2018Updated 7 years ago
- ChatGPT for Ethical Hackers, by EC-Council☆48Mar 18, 2025Updated 11 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆93Apr 27, 2025Updated 10 months ago
- ☆10Jan 26, 2023Updated 3 years ago
- MIDI Controller over USB for Thetis, PowerSDR and etc.☆10Apr 16, 2023Updated 2 years ago
- A flexible and portable solution that uses a single robust prompt and customized hyperparameters to classify user messages as either mali…☆16Aug 8, 2025Updated 6 months ago
- “Replace your politicians with code.” — Home of the Popularis Direct Democracy Whitepaper.