JeremyNGalloway / BO2KLinks
Archive of BO2K_1_1_6 filez + src
☆22Updated 7 years ago
Alternatives and similar repositories for BO2K
Users that are interested in BO2K are comparing it to the libraries listed below
Sorting:
- Malicious Software SRC Extract☆75Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- Lightweight remote administrative client written in Java.☆74Updated 6 years ago
- ☆39Updated 8 years ago
- Carberp Banking Trojan☆124Updated 10 years ago
- Various Crypter Project☆53Updated 11 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆37Updated 10 years ago
- Power Loader botnet☆42Updated 10 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Updated 8 years ago
- Simple Remote Access Trojan☆24Updated 8 years ago
- Windows Malware☆41Updated 12 years ago
- C++/C botnet using HTTP C&C☆16Updated 10 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Open-source decompilation of Disstrack☆13Updated 9 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆60Updated 3 years ago
- Passive UAC elevation using dll infection☆75Updated 11 years ago
- Public open-source code of malware NetTraveler (aka TravNet).☆38Updated 10 years ago
- Citadel 1.3.5.1☆28Updated 12 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆80Updated 6 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago
- BlackWorm SRC Extract☆16Updated 8 years ago
- ☆45Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- Carbanak leaked source☆79Updated 7 years ago