number571 / evil-coding
Random programs for evil coding.
☆19Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for evil-coding
- A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any…☆16Updated 3 years ago
- 🔑 Open source stealer written on C#, all logs will be sent to Telegram bot.☆63Updated 2 years ago
- CPU Miner monero☆45Updated 6 years ago
- Криптор на шелл-кодах☆11Updated 4 years ago
- Polymorph file protector☆41Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- Автоматизации поиска и публикации контента☆13Updated last year
- RedLine stealer Source Code (Decompiled)☆63Updated 4 years ago
- TCP Undetected BotNet☆21Updated 2 years ago
- I am not responsible for what is done with this project. This tool is solely written to be studied by other security researchers to see h…☆22Updated 10 months ago
- Browser and apps data stealer☆22Updated 10 months ago
- Program for remote computer management with Telegram on native C++ - by B4DB4B3☆108Updated 3 years ago
- 🚀Steal Tdata from PC (FTP)☆17Updated 4 years ago
- Crypter For Malware and Stealer☆34Updated 4 years ago
- Replace any BTC, XMR, XLM, ETH, XRP, LTC, BCH, NEC, DASH addresses in clipboard.☆23Updated 4 years ago
- Linux rootkit POC to hide a crypto miner's process and CPU usage.☆69Updated 11 months ago
- Работа с логами Echelon, RedLine, Racoon, DCRat etc☆66Updated last year
- Antivirus Signature Search Toolkit☆77Updated last year
- ☆52Updated 4 years ago
- It contains malicious features that can steal files from BitRAT tools.☆11Updated 2 years ago
- An open-source, centralized HTTPS botnet☆72Updated last year