evilbuffer / Osiris-SourcecodeLinks
Alleged source code leak of Osiris banking trojan
☆36Updated 4 years ago
Alternatives and similar repositories for Osiris-Sourcecode
Users that are interested in Osiris-Sourcecode are comparing it to the libraries listed below
Sorting:
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- (Sim)ulate (Ba)zar Loader☆29Updated 4 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆65Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- Recreating and reviewing the Windows persistence methods☆39Updated 3 years ago
- A multi-staged malware that contains a kernel mode rootkit and a remote system shell.☆74Updated 4 years ago
- NT AUTHORITY\SYSTEM☆42Updated 5 years ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- A simple PoC to demonstrate that is possible to write Non writable memory and execute Non executable memory on Windows☆53Updated 4 years ago
- A Bumblebee-inspired Crypter☆78Updated 2 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆32Updated 5 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 5 years ago
- UAC bypass abusing WinSxS in "wusa.exe". Referred from and similar to: https://github.com/L3cr0f/DccwBypassUAC , Kudos to L3cr0f and Fuz…☆34Updated 4 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆67Updated 3 years ago
- Grab Firefox post requests by hooking PR_Write function from nss3.dll module using trampoline hook to get passwords and emails of users☆42Updated 3 years ago
- This script make any windows compatible with RDP connection☆21Updated 2 months ago
- Simple little rootkit made in C☆13Updated 4 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 6 years ago