Random programs for evil coding.
☆21Mar 25, 2022Updated 3 years ago
Alternatives and similar repositories for evil-coding
Users that are interested in evil-coding are comparing it to the libraries listed below
Sorting:
- Автоматизации поиска и публикации контента☆14Dec 8, 2022Updated 3 years ago
- Basic c-keylogger☆26Mar 11, 2018Updated 7 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 5 years ago
- Custom THP Dropper☆26Mar 27, 2018Updated 7 years ago
- Reverse shell for remote administration☆29Feb 12, 2018Updated 8 years ago
- PoC executable packer using resources☆31Sep 29, 2016Updated 9 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Library on Arduino to add over the air (OTA) Update Capabilities to bw16/rtl8720DN☆11Aug 6, 2024Updated last year
- Full nodejs Remote Administration Tools with socket.io☆30Jun 11, 2017Updated 8 years ago
- A maid cafe's maid AI assistant with Microsoft Semantic Kernel☆10May 11, 2024Updated last year
- ☆15Feb 15, 2022Updated 4 years ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- ☆15Mar 28, 2015Updated 10 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Find and Use Cheats via the PythonGDB API☆11Aug 1, 2016Updated 9 years ago
- Michigans own low power low formfactor basic lora node to be used on Meshtastic☆28Sep 27, 2025Updated 5 months ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Apr 15, 2017Updated 8 years ago
- RTL-SDR 433MHz signal recovery with MATLAB☆12Feb 13, 2015Updated 11 years ago
- Example of verifying cryptographically signed and encrypted license files using C++, OpenSSL, Ed25519 and AES-256-GCM.☆11Dec 8, 2023Updated 2 years ago
- ☆11Apr 23, 2019Updated 6 years ago
- Process Hollowing☆12Sep 13, 2017Updated 8 years ago
- Rust + Tor (embedded) + Static (compile) + Windows + Proof of Concept☆13Feb 4, 2018Updated 8 years ago
- Open Source implementation of Audio Processing Technology codec (aptX)☆11May 20, 2023Updated 2 years ago
- ☆10Sep 12, 2019Updated 6 years ago
- For the benefit of programmers.☆10Oct 28, 2021Updated 4 years ago
- A Custom Transport strategy of the NestJS microservices pattern for Cloud Pub/Sub☆11Mar 17, 2025Updated 11 months ago
- Scan for open S3 buckets and dump☆10Mar 8, 2018Updated 7 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- General purpose Discord Bot with the hacker in mind☆13Nov 6, 2025Updated 3 months ago
- Fake telegram exchanger☆10Jun 30, 2022Updated 3 years ago
- Inject a Dll from memory☆45Sep 10, 2019Updated 6 years ago