malware source codes
☆570Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below
Sorting:
- virus collection source code☆501Feb 8, 2023Updated 3 years ago
- ☆228May 17, 2016Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,148Apr 14, 2025Updated 10 months ago
- Malware exploits☆553Aug 22, 2025Updated 6 months ago
- Course materials for Malware Analysis by RPISEC☆4,001Aug 26, 2022Updated 3 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 4 months ago
- A collection of malware samples caught by several honeypots i manage☆1,794Sep 15, 2021Updated 4 years ago
- Code written as part of our various malware investigations☆408Nov 25, 2025Updated 3 months ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆383Apr 17, 2017Updated 8 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆505Oct 8, 2017Updated 8 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Demos of various injection techniques found in malware☆796Feb 15, 2022Updated 4 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆537Jan 4, 2026Updated last month
- Windows Crypt API hook to generate weak keys☆47Nov 1, 2016Updated 9 years ago
- Windows Malware☆39Apr 17, 2013Updated 12 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆133Jan 15, 2018Updated 8 years ago
- ☆45Jun 16, 2017Updated 8 years ago
- A static analyzer for PE executables.☆1,107Updated this week
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆185Mar 30, 2019Updated 6 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆327Apr 26, 2017Updated 8 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆743Mar 17, 2019Updated 6 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆760Jan 28, 2019Updated 7 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,540Dec 8, 2020Updated 5 years ago
- wow64 syscall filter☆13Nov 12, 2014Updated 11 years ago
- Carberp Banking Trojan☆126Feb 25, 2015Updated 11 years ago
- A Tool to Unpack Self-Modifying Code using DynamoRIO☆140Apr 17, 2017Updated 8 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆463Nov 22, 2018Updated 7 years ago
- Clone of svn repository of http://insecurety.net/projects/web-malware/ project☆466Oct 18, 2016Updated 9 years ago
- Python Decoders for Common Remote Access Trojans☆1,116Jul 16, 2024Updated last year
- Sandbox for semi-automatic Javascript malware analysis, deobfuscation and payload extraction. Written for Node.js☆476Jun 16, 2023Updated 2 years ago
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,868Jun 21, 2024Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,385Jun 17, 2022Updated 3 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago