Ares-X / carbanak_source_code_leakLinks
Carbanak source code leak.
☆9Updated 7 years ago
Alternatives and similar repositories for carbanak_source_code_leak
Users that are interested in carbanak_source_code_leak are comparing it to the libraries listed below
Sorting:
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Random stuff☆16Updated 7 years ago
- ☆8Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- ☆13Updated 6 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- ☆17Updated 7 years ago
- Cross-platform malware development library for anti-analysis techniques☆24Updated 4 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆18Updated 7 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- A Simple PE File Heuristics Scanners☆50Updated 6 years ago
- A tool for scanning registery key permissions. Find where non-admins can create symbolic links.☆46Updated 5 years ago
- Script and metasploit module for CVE-2018-15982☆11Updated 4 years ago