Example of malicious codes for educational purpose, don't make shit with that
☆29Feb 15, 2019Updated 7 years ago
Alternatives and similar repositories for Malwares-code
Users that are interested in Malwares-code are comparing it to the libraries listed below
Sorting:
- Carberp Banking Trojan☆126Feb 25, 2015Updated 11 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- keylogger sends the login details by email, card number, facebook account,paypal...etc new projet 2020☆17Sep 21, 2020Updated 5 years ago
- IP Tracker With Google Map Link☆15Jun 16, 2022Updated 3 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- Module for decompressing aPLib compressed data☆17Aug 25, 2022Updated 3 years ago
- Python libraries for Windows system coding☆15May 13, 2020Updated 5 years ago
- ☆17Oct 19, 2016Updated 9 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆33Aug 20, 2018Updated 7 years ago
- Windows NT port of 'Main is usually a function. So then when is it not?'☆27Mar 11, 2024Updated 2 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Tinba Banking Trojan☆87Feb 25, 2015Updated 11 years ago
- Port Scanner, written in C++.☆16Jan 2, 2026Updated 2 months ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆26Feb 19, 2021Updated 5 years ago
- Alina Spark - Point of Sales Trojan☆49Feb 25, 2015Updated 11 years ago
- This script make any windows compatible with RDP connection☆21Jul 28, 2025Updated 7 months ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- ☆36Oct 27, 2019Updated 6 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆20Sep 18, 2017Updated 8 years ago
- Terminate the eventlog thread to disable the windows eventlog☆21Apr 1, 2020Updated 5 years ago
- ☆24Jan 24, 2019Updated 7 years ago
- ☆13Aug 11, 2018Updated 7 years ago
- Bitcoin miner by Raphael Frajuca(Badguy5552)☆11Oct 10, 2017Updated 8 years ago
- ☆29May 1, 2020Updated 5 years ago
- since some people are selling that for $25 I decided to make one myself rq since it's really easy and people shouldn't waste their money …☆11Feb 2, 2021Updated 5 years ago
- ☆27Aug 19, 2015Updated 10 years ago
- asadbg is a framework of tools to aid in automating live debugging of Cisco ASA devices☆79Jun 13, 2022Updated 3 years ago
- Virus RAT v8.0 Beta☆28Mar 4, 2017Updated 9 years ago
- Launch a command from within Amiberry to the host OS☆10Dec 26, 2025Updated 2 months ago
- javascript phishing professionel ;redirect victim if he wants to login one paypal or another web site☆12Nov 5, 2020Updated 5 years ago
- Windows Monitoring Scripts based on Monitis API☆16Dec 8, 2016Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Oct 30, 2017Updated 8 years ago
- Client of Richkware-Manager-Server, that obtains list of all hosts and is able to send commands to do at each of them.☆13Dec 28, 2025Updated 2 months ago
- PC Website Grabber enables you to save website files from a remote server straight in your browser. Useful for offline browsing of an onl…☆18Mar 21, 2021Updated 5 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Aug 25, 2018Updated 7 years ago