AhmedRaja1 / Malware-DevelopmentLinks
Malware Development
☆10Updated 5 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 4 years ago
- ☆15Updated 5 years ago
- Multipurpose malware framework☆28Updated 4 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆57Updated 8 months ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 3 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Updated 6 months ago
- Infects PE files with a shellcode☆22Updated 7 years ago
- ☆13Updated 8 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆20Updated last year
- TaskMgr Volatile Environment LPE☆16Updated 7 months ago
- A small utility to run raw code chunks in the executable memory area.☆17Updated 11 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- what the fuck is this shit☆25Updated 10 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Updated 7 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Updated 6 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Updated 5 years ago
- A Simple AES Command Line Crypter☆40Updated 3 years ago
- NT AUTHORITY\SYSTEM☆43Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Archive of ransomware decryptors☆34Updated 8 years ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 3 years ago
- Скрытие Win API☆27Updated 6 years ago
- DarkRats Standalone HVNC☆25Updated 3 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆41Updated 9 years ago