axe-usat / Example-CrypterLinks
Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.
☆17Updated 8 years ago
Alternatives and similar repositories for Example-Crypter
Users that are interested in Example-Crypter are comparing it to the libraries listed below
Sorting:
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆49Updated 6 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆115Updated 4 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Updated 2 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆133Updated 4 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 8 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆82Updated 2 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Simple runtime crypter in C++.☆44Updated 10 years ago
- An open source RansomWare☆88Updated 5 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- Zero-Day Code Injection and Persistence Technique☆28Updated 8 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆81Updated 7 years ago
- $2100 .Exe to .Doc Exploit (Python)☆53Updated 4 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- Disabling Windows Defender & downloading payload☆21Updated 4 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- A Python program that scans RAM.☆39Updated 10 years ago
- Silent file loader☆14Updated 3 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆36Updated 5 years ago
- Random stuff☆16Updated 7 years ago
- SkyRAT - Powershell Remote Administration Tool☆32Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago