☆228May 17, 2016Updated 9 years ago
Alternatives and similar repositories for malware_sources
Users that are interested in malware_sources are comparing it to the libraries listed below
Sorting:
- ☆45Jun 16, 2017Updated 8 years ago
- malware source codes☆571Dec 16, 2022Updated 3 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆78Aug 12, 2015Updated 10 years ago
- Passive UAC elevation using dll infection☆75Nov 7, 2014Updated 11 years ago
- Clone of svn repository of http://insecurety.net/projects/web-malware/ project☆467Oct 18, 2016Updated 9 years ago
- libpcap based ICMP encrypted backdoor for linux.☆132Mar 26, 2021Updated 4 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Dec 19, 2020Updated 5 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- ☆21Aug 19, 2017Updated 8 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Security Research and Development Framework☆104Sep 22, 2015Updated 10 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- ☆15Jun 12, 2015Updated 10 years ago
- Capture passwords of login attempts on non-existent and disabled accounts.☆38Aug 17, 2022Updated 3 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Malicious Software SRC Extract☆76Dec 31, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Dangerous Malwares☆216Dec 10, 2016Updated 9 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- ☆52Sep 15, 2016Updated 9 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆503Oct 8, 2017Updated 8 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- PE32 binary + W32 payload☆11Jul 23, 2017Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- ☆16Jan 31, 2015Updated 11 years ago