AhmedRaja1 / Malware-Development
Malware Development
☆11Updated 4 years ago
Alternatives and similar repositories for Malware-Development
Users that are interested in Malware-Development are comparing it to the libraries listed below
Sorting:
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- ☆13Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Multipurpose malware framework☆24Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- A new idea to build an anti ransomware☆23Updated 4 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 3 years ago
- ☆7Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 5 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 8 months ago
- TaskMgr Volatile Environment LPE☆13Updated 5 months ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆17Updated 3 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 5 months ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆27Updated 5 years ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 5 months ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆13Updated 8 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Ransomeware attack in linux☆12Updated 6 years ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- An example of PE hollowing injection technique☆23Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Simple class to search and upload files☆28Updated 5 years ago
- Hellokitty Ransomware Source Code☆15Updated last year
- ☆16Updated 3 years ago