futex / Malwares-code
Example of malicious codes for educational purpose, don't make shit with that
☆28Updated 6 years ago
Alternatives and similar repositories for Malwares-code:
Users that are interested in Malwares-code are comparing it to the libraries listed below
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- Random stuff☆16Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- A Maltego transform for VirusTotal Submitter Information☆32Updated 5 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆31Updated 8 years ago
- CVE-2017-8570 Exploit☆21Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Miscellaneous projects related to attacking Windows.☆28Updated 5 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆53Updated 11 months ago
- A simple reflective dll example☆19Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆15Updated 2 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- ☆24Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- RIG Exploit Kit (front end)☆30Updated 10 years ago