futex / Malwares-code
Example of malicious codes for educational purpose, don't make shit with that
☆28Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for Malwares-code
- Random stuff☆16Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆17Updated 8 years ago
- ☆24Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Updated 3 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 9 years ago
- A Maltego transform for VirusTotal Submitter Information☆31Updated 5 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 7 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆25Updated 5 years ago
- My personal Automated Malware Analysis Sandboxes and Services☆22Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 9 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 6 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 9 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 3 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Updated last year