Malicious Software SRC Extract
☆32Jan 2, 2023Updated 3 years ago
Alternatives and similar repositories for Malicious-Software
Users that are interested in Malicious-Software are comparing it to the libraries listed below
Sorting:
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- Dangerous Malwares☆215Dec 10, 2016Updated 9 years ago
- SQLi Tool/SQL Injection/Hijacker☆45Dec 10, 2016Updated 9 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Windows Remote-Access-Trojan☆716Dec 28, 2016Updated 9 years ago
- Windows Crypter☆424Dec 28, 2016Updated 9 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- A tool to copy only the changed files to a new folder, useful to create incremental update packages.☆11Jan 27, 2022Updated 4 years ago
- this is a bot that will get the correct answers right at least 90% of the time on edgenuity. edgenuity is a common site used for middle s…☆14Jun 28, 2021Updated 4 years ago
- carbanak\group_ib_smart_boys☆12Jul 12, 2018Updated 7 years ago
- Cyber competition scoring engine☆17Jun 15, 2016Updated 9 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- ☆18Feb 4, 2016Updated 10 years ago
- ☆18Nov 9, 2023Updated 2 years ago
- upstream for seccheck☆15Jun 11, 2018Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated last week
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- Public exploits (re)writed while learning.☆14Aug 7, 2013Updated 12 years ago
- Zero-Day Code Injection and Persistence Technique☆30Mar 23, 2017Updated 8 years ago
- Windows Remote Administration Tool via Telegram☆36Apr 20, 2017Updated 8 years ago
- Botnet☆939Feb 8, 2023Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆13Sep 27, 2016Updated 9 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Jul 24, 2022Updated 3 years ago