malware source codes
☆578Dec 16, 2022Updated 3 years ago
Alternatives and similar repositories for malware
Users that are interested in malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- virus collection source code☆515Feb 8, 2023Updated 3 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,163Apr 14, 2025Updated last year
- ☆228May 17, 2016Updated 9 years ago
- Malware exploits☆560Aug 22, 2025Updated 8 months ago
- Course materials for Malware Analysis by RPISEC☆4,017Aug 26, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A collection of malware samples caught by several honeypots i manage☆1,815Sep 15, 2021Updated 4 years ago
- Various snippets created during malware analysis☆466Oct 3, 2025Updated 6 months ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Aug 4, 2020Updated 5 years ago
- Zerokit/GAPZ rootkit (non buildable and only for researching)☆183Mar 30, 2019Updated 7 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆383Apr 17, 2017Updated 9 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆540Jan 4, 2026Updated 3 months ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Code written as part of our various malware investigations☆410Nov 25, 2025Updated 5 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Windows Malware☆39Apr 17, 2013Updated 13 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆508Oct 8, 2017Updated 8 years ago
- Demos of various injection techniques found in malware☆791Feb 15, 2022Updated 4 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,556Dec 8, 2020Updated 5 years ago
- ☆520Mar 12, 2018Updated 8 years ago
- Virtualbox, VirtualMachine, Cuckoo, Anubis, ThreatExpert, Sandboxie, QEMU, Analysis Tools Detection Tools☆462Nov 22, 2018Updated 7 years ago
- Defund the Police.☆13,686Jun 7, 2024Updated last year
- ☆28Apr 18, 2016Updated 10 years ago
- InfectPE - Inject custom code into PE file [This project is not maintained anymore]☆325Apr 26, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆45Jun 16, 2017Updated 8 years ago
- makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]☆740Mar 17, 2019Updated 7 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆133Jan 15, 2018Updated 8 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 5 years ago
- Windows Crypt API hook to generate weak keys☆48Nov 1, 2016Updated 9 years ago
- Pafish is a testing tool that uses different techniques to detect virtual machines and malware analysis environments in the same way that…☆3,888Jun 21, 2024Updated last year
- Malcom - Malware Communications Analyzer☆1,168Nov 29, 2017Updated 8 years ago
- Botnet☆948Feb 8, 2023Updated 3 years ago
- wow64 syscall filter☆14Nov 12, 2014Updated 11 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Clone of svn repository of http://insecurety.net/projects/web-malware/ project☆470Oct 18, 2016Updated 9 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,933Apr 1, 2026Updated last month
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆764Jan 28, 2019Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆1,391Jun 17, 2022Updated 3 years ago
- A static analyzer for PE executables.☆1,122Mar 11, 2026Updated last month
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- zeus-style banking trojan☆476Jun 26, 2017Updated 8 years ago