Random programs for evil coding.
☆21Mar 25, 2022Updated 3 years ago
Alternatives and similar repositories for evil-coding
Users that are interested in evil-coding are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- Автоматизации поиска и публикации контента☆14Dec 8, 2022Updated 3 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 6 years ago
- Basic packer using XOR encryption☆31Mar 29, 2024Updated last year
- hCaptcha HTTP middleware for Go web servers☆34Dec 24, 2022Updated 3 years ago
- Zero-knowledge one-time secret sharing. End-to-end encrypted, self-hosted, open source.☆13Updated this week
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- MoarTube is an anonymous, decentralized platform for video and live streaming. The Client processes content and manages your Node, while …☆15Feb 16, 2026Updated last month
- Live Streaming Server based on NGINX and NGINX-RMTP-Module☆11Jul 1, 2020Updated 5 years ago
- Fake telegram exchanger☆10Jun 30, 2022Updated 3 years ago
- MtE - MuTation Engine☆13Sep 4, 2022Updated 3 years ago
- ☆12Apr 1, 2020Updated 5 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- Basic c-keylogger☆26Mar 11, 2018Updated 8 years ago
- DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API☆47Mar 21, 2018Updated 8 years ago
- Lua module to parse a Portable Executable (.exe , .dll, etc.) file and extract metadata☆24Jul 30, 2024Updated last year
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆20Dec 9, 2024Updated last year
- Simple C# Keylogger (Keyboard Layout)☆66Jul 22, 2019Updated 6 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- A Qt-Wrapper for the AES-implementation kokke/tiny-AES128-C☆12Jan 23, 2019Updated 7 years ago
- telegram notify alert on server ssh login☆19Feb 21, 2023Updated 3 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Конвертёр кук из JSON в Netscape формат, предоставленный разработчиками ZennoLab☆10Dec 8, 2022Updated 3 years ago
- Automatically generate Python type stubs for QuantConnect's Lean☆18Jan 2, 2026Updated 2 months ago
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- For those who are running domains through CloudFlare to their own servers with dynamic IP addresses. cloudReflare will automatically scan…☆18Jul 19, 2023Updated 2 years ago
- TonLib for Golang☆58Jul 6, 2021Updated 4 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Automatic Malware Signature Generation Tool☆16Oct 13, 2021Updated 4 years ago
- Selenium Instagram web-scraping automation scripts: not following back, and others☆12Nov 8, 2020Updated 5 years ago
- Webseeded torrent creator using GitHub Actions☆102Mar 2, 2026Updated 3 weeks ago
- Example of verifying cryptographically signed and encrypted license files using C++, OpenSSL, Ed25519 and AES-256-GCM.☆11Dec 8, 2023Updated 2 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- Проект создан для более удобного управления каналами в Телеграме☆14Oct 30, 2023Updated 2 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago