Malicious code for cybersecurity research and training
Simple tools for reconnaissance and exfilt
Simple and configurable tool for annoying adware
Configurable cryptominer
Misc malicious vba code to recon, steal, harm.
Tools work only if the locate one of the following:
C:\i_am_victim.txt
/etc/i_am_victim.txt