uraninite / stuxnet
Stuxnet is an extremely sophisticated computer worm that exploits multiple previously unknown Windows zero-day vulnerabilities to infect computers and spread. Its purpose was not just to infect PCs but to cause real-world physical effects. Specifically, it targets centrifuges used to produce the enriched uranium that powers nuclear weapons and r…
☆62Updated 3 years ago
Alternatives and similar repositories for stuxnet:
Users that are interested in stuxnet are comparing it to the libraries listed below
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.☆47Updated 11 months ago
- ☆32Updated last year
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆37Updated 5 months ago
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆74Updated 9 months ago
- ☆65Updated 3 years ago
- ☆39Updated last month
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆56Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 2 years ago
- Antivirus Signature Search Toolkit☆79Updated last year
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- 「💽」MBR Overwrite malware for linux☆26Updated 4 months ago
- Persistent & Undetectable Malware Backdoor☆29Updated 11 months ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Well, I have created this shit for educational pruposes (I think)☆35Updated 2 years ago
- LNK-Dropper Builder☆22Updated last week
- PoC of a UEFI Petya ransomware☆41Updated 2 years ago
- A fast, lightweight botnet written in pure C.☆34Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆27Updated 2 years ago
- Reverse Shell - technique is commonly used in cyber attacks☆16Updated last year
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Advanced dynamic malware analysis tool.☆82Updated last year
- Listing UDP connections with remote address without sniffing.☆30Updated last year
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆26Updated 6 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆33Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆73Updated last month
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆15Updated 3 years ago
- A command and control framework.☆50Updated 3 months ago
- simple user-mode Rootkit☆104Updated 2 years ago