Fresh malware samples caught in the wild daily from random places. 🎣
☆19Jun 27, 2019Updated 6 years ago
Alternatives and similar repositories for Perfect-Malware-Samples
Users that are interested in Perfect-Malware-Samples are comparing it to the libraries listed below
Sorting:
- Simple little rootkit made in C☆13Feb 15, 2021Updated 5 years ago
- A simple tool for parsing elf binaries☆10Aug 18, 2019Updated 6 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆18Sep 7, 2019Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- Sample of windows key logger.☆14Dec 27, 2019Updated 6 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- HydraSide is a opensource Tor Based RAT (*Remote Administration Tool*)☆22Mar 12, 2015Updated 11 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Nov 12, 2014Updated 11 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆31May 22, 2017Updated 8 years ago
- 恶意软件原理图☆59Mar 29, 2021Updated 4 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 6 months ago
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- ☆17Jul 26, 2018Updated 7 years ago
- Extracts and visualizes control flow graphs for assembly code.☆13Mar 31, 2019Updated 6 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Popping boxes with Nmap☆18Apr 16, 2012Updated 13 years ago
- Satori botnet variant☆13Mar 19, 2022Updated 4 years ago
- ☆15Mar 24, 2016Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- badusb联动cobaltrstrike近源攻击☆26Aug 20, 2021Updated 4 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Jan 8, 2023Updated 3 years ago
- Run TTPs, with AI!☆115Feb 23, 2026Updated 3 weeks ago
- This repo generally for malware Researcher ("Password: infected")☆19Feb 24, 2026Updated 3 weeks ago
- ☆13Oct 20, 2021Updated 4 years ago
- Collection of shellcode injection and execution techniques☆18Updated this week
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Jan 19, 2020Updated 6 years ago