Explorations into all things evil
This is an experiment in all things evil. The files contained here are all about causing pain and suffering on computers. You have been warned. That being said this is meant to be a research effort into computer security. There won't be a lot of detailed explanation as to what is going on here for a few obvious reasons. Most of this stuff will just be brain dumps and "I wonder if I can do that" exercises. Feel free to use anything here to help you learn more about security. All I ask is that you don't use any of the code here for real ultimate evil. Basically, don't be a dick.