SKocur / Malware-Collection
Source codes of malwares, stress tests etc. for computer.
β37Updated 5 years ago
Alternatives and similar repositories for Malware-Collection
Users that are interested in Malware-Collection are comparing it to the libraries listed below
Sorting:
- Shellcode / Buffer Overflow π£β20Updated 4 years ago
- Malicious Software SRC Extractβ30Updated 2 years ago
- My public exploit collection.β32Updated 6 years ago
- Windows application aiming to preserve cryptographic information used by ransomware operations. If you suspect a ransomware is running onβ¦β28Updated 7 years ago
- Pentest ToolKitβ28Updated 5 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.β34Updated 8 years ago
- Collection of cracked malwareβ14Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.β27Updated 7 years ago
- β52Updated 4 years ago
- Ubuntu stealer, steal ubuntu information in local pcβ21Updated 5 years ago
- Windows/Linux - ReverseShellBackdoor Frameworkβ48Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teamingβ19Updated 5 years ago
- Software exploitation training materialβ15Updated 7 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.β24Updated 4 years ago
- Information Stealers Wall of Sheep (IS-WOS)β12Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ22Updated 2 years ago
- Sp00fer blog post -β26Updated 2 years ago
- iOS malware samplesβ43Updated 9 years ago
- Mass malicious script dump/Malware src dumpβ15Updated 8 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.β28Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.β1Updated 3 years ago
- Malquarium - Modern Malware Repositoryβ47Updated 3 weeks ago
- The Hall of Ancient Exploitation Toolsβ16Updated 5 years ago
- Phoenix based exploit kit for educational purpose.β17Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan β¦β50Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β35Updated 5 years ago
- Service for management of hosts where is present a malware developed using Richkware framework.β18Updated 9 months ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles π₯ (For Research Only)β14Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Imageβ52Updated 7 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)β32Updated 5 years ago