恶意软件原理图
☆60Mar 29, 2021Updated 5 years ago
Alternatives and similar repositories for Malware-Picture
Users that are interested in Malware-Picture are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 精心制作的恶意软件分析工具和资源列表A curated list of awesome malware analysis tools and resources☆43Dec 28, 2017Updated 8 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆20Jun 27, 2019Updated 6 years ago
- Tools for generating and validating IBANs (International Bank Account Numbers)☆10Aug 11, 2020Updated 5 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Spoof parent process ID☆14Jan 23, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 整理每个流行botnet家族的专杀脚本、靶机环境、检测规则、病毒样本、病毒原理图☆76Mar 29, 2021Updated 5 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- 恶意软件容器靶机☆107Mar 4, 2021Updated 5 years ago
- 恶意脚本检测分类工具☆40Jan 26, 2021Updated 5 years ago
- ShellcodeVM☆15Jun 20, 2016Updated 9 years ago
- Temporary storage for exe2aut☆34Apr 17, 2019Updated 6 years ago
- Zerokit shared code☆17Mar 28, 2019Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆20Sep 12, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆13Sep 6, 2019Updated 6 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 6 months ago
- Some crazy PE executables protection kernel driver☆20May 2, 2020Updated 5 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- a open source rat from china☆26Oct 28, 2016Updated 9 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Aug 13, 2018Updated 7 years ago
- Execute an arbitrary command within the context of another process☆21Jun 28, 2019Updated 6 years ago
- Add export function and convert exe to dll☆27Sep 20, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Multi-threaded web application directory bruteforcer☆29Feb 4, 2019Updated 7 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- ☆27May 1, 2020Updated 5 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- JScript RAT☆100Sep 27, 2020Updated 5 years ago
- BabelDeobfuscator is an open-source deobfuscator for BabelObfuscator☆11May 15, 2015Updated 10 years ago
- Variety of different process injections implemented in C++☆26May 2, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Software Protector☆20Aug 16, 2020Updated 5 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- bmod parses binaries for modification/patching and disassembles machine code sections.☆12Apr 19, 2018Updated 7 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year