Leaked Mirai Source Code for Research/IoC Development Purposes
☆16Oct 31, 2016Updated 9 years ago
Alternatives and similar repositories for Mirai-Source-Code
Users that are interested in Mirai-Source-Code are comparing it to the libraries listed below
Sorting:
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆14Nov 1, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Mar 19, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Nov 12, 2016Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Remote Administration Tool for Windows☆40Mar 30, 2016Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- malwares src dump☆41Mar 3, 2017Updated 8 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆16Aug 4, 2023Updated 2 years ago
- Unity SDK for Aptabase: Open Source, Privacy-First and Simple Analytics for Mobile, Desktop and Web Apps☆20Feb 22, 2026Updated last week
- ☆18Nov 9, 2023Updated 2 years ago
- Dangerous Malwares☆215Dec 10, 2016Updated 9 years ago
- SQLi Tool/SQL Injection/Hijacker☆45Dec 10, 2016Updated 9 years ago
- ☆21Updated this week
- ☆29Jul 7, 2023Updated 2 years ago
- EmoKill is an Emotet process detection and killing tool for Windows OS. It avoids wasting time after detection of Emotet. Any process t…☆13Dec 8, 2022Updated 3 years ago
- Windows Remote Administration Tool via Telegram☆36Apr 20, 2017Updated 8 years ago
- Zero-Day Code Injection and Persistence Technique☆30Mar 23, 2017Updated 8 years ago
- Note 10+ (Hong Kong) wifi-service.jar☆10Oct 11, 2020Updated 5 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- Growtopia stealer written at C# that steal save.dat, mac address, IP information, etc...☆10Aug 17, 2021Updated 4 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆37Dec 19, 2023Updated 2 years ago
- 0day-today-archive: Historical collection of exploits and vulnerabilities from 0day.today☆34Sep 22, 2025Updated 5 months ago
- Backport of SliverStager to work with DotNetToJScript for vba☆16Aug 9, 2024Updated last year
- Integrated Windows Authentication in Java☆12Jan 11, 2026Updated last month
- ☆11Mar 5, 2020Updated 5 years ago
- Vagrant setup for CentOS 6.3 LAMP stack (Linux, Apache, MySQL and PHP).☆38Dec 27, 2013Updated 12 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- Suite of libraries and utilities to manipulate Generation 3 (Gen3) Pokémon games☆12Mar 22, 2025Updated 11 months ago