Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.
☆26Jun 29, 2017Updated 8 years ago
Alternatives and similar repositories for malware-1
Users that are interested in malware-1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 9 months ago
- ☆18Jan 17, 2024Updated 2 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Quickly Change Your MAC Address in OSX to a Random Address.☆13Jul 27, 2015Updated 10 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- IDA Pro plugin to aid with the analysis of native IIS modules☆21Aug 1, 2024Updated last year
- Simple Remote Access Trojan☆27Dec 28, 2016Updated 9 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Overwrite MBR and add own custom message☆16Apr 1, 2020Updated 5 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.☆18Sep 15, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆35Dec 21, 2023Updated 2 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- Ghidra变强术,一个Ghidra脚本库,二进制安全,PWN☆12Jan 21, 2024Updated 2 years ago
- Login Pages Database forms a knowledge base on login pages related to malicious activities (C2 panels, phishing kits...).☆39Jan 22, 2023Updated 3 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- haze binary fuzzer☆56May 19, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Updated this week
- Coq formalization of algorithms due to Tarjan and Kosaraju for finding strongly connected graph components using Mathematical Components …☆18Mar 3, 2026Updated 3 weeks ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- DUQU MALWARE SOURCE + BINARY + More coming☆13Feb 6, 2023Updated 3 years ago
- Windows builds for atuin.☆12Oct 25, 2024Updated last year
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- ☆24Aug 4, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆15Mar 2, 2014Updated 12 years ago
- Cisco RV042/016/082 Router Firmware☆14Mar 8, 2020Updated 6 years ago
- bootkit驱动映射,三环进程注入加载指定模块☆14Oct 8, 2024Updated last year
- ☆11Jul 19, 2020Updated 5 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- Disclosing information from an AppContainer.☆16Sep 11, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago