OsandaMalith / MalwareLinks
This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.
☆12Updated 6 years ago
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- C & Shellcode Playground..☆10Updated 8 years ago
- ☆17Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- ☆40Updated 7 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Updated 8 years ago
- Penetration Test / Read Team - C# tools repository☆55Updated 4 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- Random stuff☆16Updated 7 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 7 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- ☆14Updated 6 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 5 years ago
- A Linux RAT in C☆33Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 6 years ago