Malicious Software SRC Extract
☆32Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for Malicious-Software
Users that are interested in Malicious-Software are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Exploitkit☆189Dec 10, 2016Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- WebShell Dump☆178Dec 10, 2016Updated 9 years ago
- malwares src dump☆41Mar 3, 2017Updated 9 years ago
- Remote Administration Tool for Windows☆41Mar 30, 2016Updated 9 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 10 years ago
- Windows Remote-Access-Trojan☆719Dec 28, 2016Updated 9 years ago
- Windows Stealer☆190Dec 10, 2016Updated 9 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- Windows Crypter☆425Dec 28, 2016Updated 9 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated last month
- Windows Remote Administration Tool via Telegram☆38Apr 20, 2017Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆31Mar 23, 2017Updated 9 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Botnet☆943Feb 8, 2023Updated 3 years ago
- carbanak\group_ib_smart_boys☆12Jul 12, 2018Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- ☆29Jul 7, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆29Mar 26, 2023Updated 2 years ago
- An Handmade script - Jewels Robbery using qtarget, ox_inventory, ox_lib☆10Oct 24, 2022Updated 3 years ago
- njRAT C# Stub - Fixed For PowerShell☆61Sep 15, 2019Updated 6 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- A trojan horse that drops a portable runtime of MinerGate's CLI CPU cryptocurrency miner. Includes basic persistance.☆26May 1, 2017Updated 8 years ago