Fresh malware samples caught in the wild daily from random places. π£
β19Jun 27, 2019Updated 6 years ago
Alternatives and similar repositories for Perfect-Malware-Samples
Users that are interested in Perfect-Malware-Samples are comparing it to the libraries listed below
Sorting:
- Simple little rootkit made in Cβ13Feb 15, 2021Updated 5 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)β17Sep 7, 2019Updated 6 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless Eβ¦β12Aug 26, 2016Updated 9 years ago
- Remote Administration Toolβ13Jul 9, 2023Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whiβ¦β11Jan 8, 2023Updated 3 years ago
- Reverse TCP Python Frameworkβ25Nov 7, 2017Updated 8 years ago
- -notes and scripts for online course OffIOTβ12Jan 19, 2026Updated last month
- A simple tool for parsing elf binariesβ10Aug 18, 2019Updated 6 years ago
- Satori botnet variantβ13Mar 19, 2022Updated 3 years ago
- DOSrat by Criper98 ~ Un Remote Administrator Tool in ITA per Windowsβ10Oct 14, 2022Updated 3 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.β14Sep 9, 2012Updated 13 years ago
- Spoof parent process IDβ13Jan 23, 2019Updated 7 years ago
- Sample of windows key logger.β14Dec 27, 2019Updated 6 years ago
- Key logger for windows written in C#β16May 14, 2012Updated 13 years ago
- Common Malware Techniquesβ13Mar 26, 2023Updated 2 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro hoβ¦β15Feb 19, 2016Updated 10 years ago
- ζΆζθ½―δ»ΆεηεΎβ59Mar 29, 2021Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.β12Sep 6, 2019Updated 6 years ago
- β13Oct 20, 2021Updated 4 years ago
- Basic disassembly technique to slow down disasm processβ11Sep 20, 2019Updated 6 years ago
- Code snippets for Qiling Tutorialsβ21Aug 22, 2020Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.β15Jun 3, 2019Updated 6 years ago
- Phantom DLL Hollowing method implemented in modmapβ18Jun 9, 2021Updated 4 years ago
- β22Apr 9, 2025Updated 10 months ago
- MalDev & AV-EDR Evasion for Pentestersβ20Feb 17, 2023Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progressβ15Mar 7, 2022Updated 3 years ago
- Opensource 4G Core On AWS EKSβ19Nov 10, 2022Updated 3 years ago
- WebSettingβ16Jul 19, 2022Updated 3 years ago
- Command line Remote Access tool (RAT) targeting Windows Systems.β16Sep 16, 2019Updated 6 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.β10Dec 1, 2019Updated 6 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.β31May 22, 2017Updated 8 years ago
- Python backdoor that uses http post/get requests to communicateβ42Aug 24, 2016Updated 9 years ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Torβ18Mar 12, 2020Updated 5 years ago
- Dump mapped PE files from memory to the diskβ20Jun 28, 2019Updated 6 years ago
- This is a basic Python script that accepts a website's url in string format to initiate a DDoS attack. For educational purposes only.β14Jan 3, 2015Updated 11 years ago
- Collection of shellcode injection and execution techniquesβ18Aug 21, 2025Updated 6 months ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentialsβ48Mar 22, 2022Updated 3 years ago
- PHP Phishing Frameworkβ28Dec 28, 2013Updated 12 years ago
- β17Jul 26, 2018Updated 7 years ago