Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.
☆89Jun 28, 2017Updated 8 years ago
Alternatives and similar repositories for malware-1
Users that are interested in malware-1 are comparing it to the libraries listed below
Sorting:
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- SOLID principles using modern C++☆10Dec 11, 2021Updated 4 years ago
- Threat Hijacking Simple Implementation☆18Feb 24, 2025Updated last year
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Mar 13, 2018Updated 7 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Strong Python Protector & Obfuscator☆10Oct 23, 2020Updated 5 years ago
- ☆14Jul 20, 2020Updated 5 years ago
- Unofficial mirror of TestU01, a test suite for random number generator (C library) for the empirical statistical testing of uniform rando…☆19Feb 16, 2019Updated 7 years ago
- Криптор на шелл-кодах☆11May 3, 2020Updated 5 years ago
- Показывает пароли во всех Хромах, включая версии 80 и выше.☆12May 23, 2020Updated 5 years ago
- Small handy tool for crafting shellcodes by hand.☆18Apr 20, 2022Updated 3 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆15Aug 10, 2020Updated 5 years ago
- UAdmin Phishlets for common sites☆16Jun 12, 2025Updated 8 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- ☆11Oct 17, 2020Updated 5 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- ☆18Oct 12, 2014Updated 11 years ago
- Six cases demonstrating methods of optimizing GetProcAddress☆18Jan 3, 2022Updated 4 years ago
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆38Jul 28, 2022Updated 3 years ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- RAT-via-Telegram☆39Apr 20, 2017Updated 8 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Aug 18, 2021Updated 4 years ago
- A stealthy C++ shellcode loader using anti-analysis checks, AES-256 decryption, and dynamic memory permissions to evade detection. Includ…☆21Apr 2, 2025Updated 11 months ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- ☆25Apr 28, 2024Updated last year
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- PoC code and tools for Black Hat USA 2024☆24Aug 1, 2024Updated last year
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Polymorph file protector☆43Jun 12, 2019Updated 6 years ago
- Code-Reuse Exploits detection using Intel Processor Trace☆28May 19, 2018Updated 7 years ago
- windows kernel File redirection☆20Sep 21, 2014Updated 11 years ago
- ☆24Oct 30, 2024Updated last year
- ☆36May 27, 2024Updated last year