JeremyNGalloway / BO2KLinks
Archive of BO2K_1_1_6 filez + src
☆22Updated 7 years ago
Alternatives and similar repositories for BO2K
Users that are interested in BO2K are comparing it to the libraries listed below
Sorting:
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 9 years ago
- Malicious Software SRC Extract☆75Updated 9 years ago
- Mass malicious script dump/Malware src dump☆57Updated 9 years ago
- Carberp Banking Trojan☆126Updated 10 years ago
- ☆20Updated 8 years ago
- ☆39Updated 8 years ago
- Power Loader botnet☆41Updated 10 years ago
- Windows Malware☆41Updated 12 years ago
- Windows payload written in C++, gives total control to the infected machine via reverse-TCP sockets from a web application☆18Updated 8 years ago
- Various Crypter Project☆54Updated 11 years ago
- Open-source decompilation of Disstrack☆13Updated 9 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Citadel 1.3.5.1☆28Updated 12 years ago
- ☆12Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- MALM: Malware Monitor☆49Updated 12 years ago
- KINS Banking Trojan☆65Updated 10 years ago
- Simple Remote Access Trojan☆24Updated 9 years ago
- Clone repository for Source Code secret anti-forensic tools Marble Framework CIA, Leaked by WikiLeaks.☆28Updated 8 years ago
- A small utility to run raw code chunks in the executable memory area.☆16Updated 10 years ago
- BlackWorm SRC Extract☆16Updated 9 years ago
- A decoder for Petya victim keys, using the Janus' masterkey.☆61Updated 3 years ago
- ☆27Updated 8 years ago
- Application for cracking Red Petya key based on genetic algorithms.☆56Updated 3 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆44Updated 8 years ago