Warning
This repository contains malware and should never be executed outside of secure test environments.
This repository is intended strictly for educational, ethical, and legal cybersecurity research.
You may find:
- π Malware samples
- π§ͺ Proof-of-concept payloads
- π§ Re-creations of historical code (for study only)
All content is designed for controlled virtual machines or sandbox environments.
Important
Misusing this content can result in legal consequences. You are 100% responsible for what you do with it.
- Do not execute any code on real systems.
- Do not use this for unethical or unauthorized access.
- Do not attempt to deploy outside your private environment.
By downloading or using anything in this repository, you confirm that:
- You are working in a safe, isolated, and legal environment.
- You understand the risks of working with potentially dangerous software.
- You accept full responsibility for any outcomes.
Tip
Malware samples that attempt to escape a virtual machine or replicate automatically (e.g., worm behavior) are clearly marked.
Use caution when running such samples β even in VMs.
Caution
This repo is not a toy. Handle with care, use ethically, and respect legal boundaries.
Stay safe, and never run anything unless you understand it 100%.