MalwareBlockerYT / MalwareDepositLinks
Free Malware Samples
☆17Updated 7 years ago
Alternatives and similar repositories for MalwareDeposit
Users that are interested in MalwareDeposit are comparing it to the libraries listed below
Sorting:
- malwares src dump☆42Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆89Updated 9 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆57Updated 10 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆11Updated 8 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆88Updated 7 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 6 years ago
- Tinba Banking Trojan☆86Updated 10 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- PoC malware built by copy-paste☆25Updated 4 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆71Updated 11 years ago
- A fast and advanced ransomware PoC☆60Updated 9 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 9 years ago
- A simple keylogger application for XSS attack.☆16Updated 7 years ago
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆130Updated 8 years ago
- Python script to automatically deobfuscate malware code☆59Updated 6 years ago
- Clone of hidden tear written in C++☆69Updated 4 years ago
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27Updated 9 years ago
- ☆68Updated 8 years ago
- Power Loader botnet☆40Updated 10 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago