Chiggins / malware_sourcesLinks
☆224Updated 9 years ago
Alternatives and similar repositories for malware_sources
Users that are interested in malware_sources are comparing it to the libraries listed below
Sorting:
- ZeroAccess v3 toolkit☆164Updated 7 years ago
- malware source codes☆555Updated 2 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆496Updated 7 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆323Updated 2 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆216Updated 4 years ago
- A tool to detect and crash Cuckoo Sandbox☆295Updated 10 months ago
- Exploitkit☆184Updated 8 years ago
- Windows XP 32-Bit Bootkit☆145Updated 10 years ago
- Dangerous Malwares☆205Updated 8 years ago
- Carberp Banking Trojan☆114Updated 10 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆151Updated 2 years ago
- ☆515Updated 7 years ago
- Tinba Banking Trojan☆85Updated 10 years ago
- This is a **WIP** tool that performs shellcode obfuscation in x86 instruction set.☆239Updated 8 years ago
- Malware exploits☆546Updated 5 years ago
- Mirror of users section of rootkit.com☆297Updated 8 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆368Updated 8 years ago
- Demos of various injection techniques found in malware☆791Updated 3 years ago
- Simple runtime crypter in C/C++.☆163Updated 9 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆89Updated 9 years ago
- WebShell Dump☆172Updated 8 years ago
- DarkAgent Remote Administration Tool RAT by DragonHunter☆139Updated 12 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆282Updated 7 years ago
- Patching ROP-encoded shellcodes into PEs☆186Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆131Updated 7 years ago
- C++ application that uses memory and code hooks to detect packers☆270Updated 7 years ago
- Scout backdoor for Windows☆115Updated 9 years ago
- some pocs for antivirus evasion☆131Updated last year