MrEmpy / MBROverwrite
「💽」MBR Overwrite malware for linux
☆22Updated last year
Related projects: ⓘ
- Russian Wipers Dropper (educational-purposes )☆84Updated 2 years ago
- ☆11Updated this week
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆53Updated last year
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆67Updated 3 months ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆26Updated last year
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆31Updated 2 years ago
- user-mode Rootkit☆98Updated last year
- Well, I have created this shit for educational pruposes (I think)☆32Updated 2 years ago
- PoC of a UEFI Petya ransomware☆37Updated last year
- ☆19Updated this week
- ☆74Updated this week
- This is a free & Open source File dropper that is made strictly for EdUcAtIoNaL pUrPoSeS of course☆29Updated 2 years ago
- Advanced Keylogger / Info Grabber written in C++.☆25Updated last year
- Write-ups and proof of concepts of design and implementaion of various modern malwares.☆19Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆107Updated last year
- Cronos Crypter is an simple example of crypter created for educational purposes.☆98Updated 2 years ago
- Conti Ransomware Source Code☆16Updated 2 years ago
- ☆17Updated this week
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 3 years ago
- Lime Crypter Obfuscator Mod☆27Updated 2 months ago
- ☆26Updated this week
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆24Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookies☆36Updated 10 months ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Updated 11 months ago
- Create a malicious pip package (PoC)☆9Updated last year
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆23Updated 4 years ago
- Tool to retrieve Config from Redline C2 servers☆16Updated last year
- ☆72Updated this week
- ☆32Updated this week
- Криптор на шелл-кодах☆11Updated 4 years ago