Example of malicious codes for educational purpose, don't make shit with that
☆28Feb 15, 2019Updated 7 years ago
Alternatives and similar repositories for Malwares-code
Users that are interested in Malwares-code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Carberp Banking Trojan☆127Feb 25, 2015Updated 11 years ago
- IP Tracker With Google Map Link☆15Jun 16, 2022Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- ☆129Feb 2, 2025Updated last year
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆14Oct 19, 2016Updated 9 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆33Aug 20, 2018Updated 7 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- ☆10Dec 9, 2018Updated 7 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Mar 11, 2024Updated 2 years ago
- Tinba Banking Trojan☆88Feb 25, 2015Updated 11 years ago
- Port Scanner, written in C++.☆16Jan 2, 2026Updated 3 months ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Alina Spark - Point of Sales Trojan☆50Feb 25, 2015Updated 11 years ago
- This script make any windows compatible with RDP connection☆22Jul 28, 2025Updated 9 months ago
- WIP Emotet Control Flow Unflattening using miasm and radare2☆23Dec 27, 2022Updated 3 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- ☆24Jan 24, 2019Updated 7 years ago
- since some people are selling that for $25 I decided to make one myself rq since it's really easy and people shouldn't waste their money …☆11Feb 2, 2021Updated 5 years ago
- ☆27Aug 2, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Antidetect source code. Protection from detection.☆27Nov 11, 2018Updated 7 years ago
- ☆26Aug 19, 2015Updated 10 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- Virus RAT v8.0 Beta☆29Mar 4, 2017Updated 9 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆13Nov 5, 2020Updated 5 years ago
- Windows Monitoring Scripts based on Monitis API☆16Dec 8, 2016Updated 9 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Launch a command from within Amiberry to the host OS☆11Apr 13, 2026Updated 2 weeks ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago
- ☆16May 6, 2015Updated 10 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Dec 16, 2017Updated 8 years ago