There are 23 repositories under worm topic.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
🏠 A collection of personal configuration files for various rices I have made.
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
A framework for constructing self-spreading binaries
A Collection of Cute But Deadly Viruses
Ransomwares Collection. Don't Run Them on Your Device.
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
Scrapes the web serial Worm and its sequel Ward into an eBook format
stuxnet Source & Binaries. ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! Includes: Source files, Binaries, PLC Samples,Fanny Added in another repo.
A tool to perform DDoS attack with control panel to control your crazy zombies : )
Disable WD using VBS
Automatically scrapes wildbow's web serials and compiles them into ebooks
:key: Scan the entire internet for SSH and Telnet services. Then hack them.
This is a repository containing Python code examples for educational purposes in the field of cybersecurity. The code covers topics such as malware, security strategies, and more. It is a useful resource for those interested in learning about the technical aspects of cybersecurity.
Malware Repository 2018
Mystery Legacy Repo is for advanced penetration tools
Popular Malware-Samples for research and educational purposes.(60+ Samples!)
Collaborative malware exchange repository.
WannaCry|WannaDecrypt0r decompiled
Welcome to my Database of Malware!
Fresh malware samples caught in the wild daily from random places. 🎣
Worms like game made with unity and c#
Formatted and commented source code of the ILOVEYOU computer virus.
Scrapes wildbow's twig, pact, glow-worm, ward and worm into epubs with some extra ease-of-use features. Now deprecated.
Projet long TLS-SEC pour la réalisation d'un challenge "tuto" lors de la Toulouse Hacking Convention. Exploitation de la faille Blueborne.
Ivan Ricart Borges - Study of propagation techniques used by viruses. Simulation of propagation through P2P, NetBios, USB Devices, MSN Messenger.
A virus that should restart your pc every hour, completely written in java, also acts as a worm and can be used as a trojan
NetWorm, a benchmarking worm for MTD analysis