nyx0 / Pony
Pony 2.0 Stealer
☆226Updated 10 years ago
Alternatives and similar repositories for Pony:
Users that are interested in Pony are comparing it to the libraries listed below
- Windows Stealer☆189Updated 8 years ago
- ☆3Updated 4 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆51Updated 5 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆132Updated 3 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- Titan stealer source☆67Updated 2 years ago
- Windows Crypter☆418Updated 8 years ago
- XOR encryption, malware crypter☆94Updated 11 years ago
- Browser and apps data stealer☆23Updated last year
- Revenge-RAT C# Stub - Fixed☆92Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- Dump browser passwords(chrome, firefox) with sqlite3 lib.☆87Updated 8 years ago
- Escalation / Bypass Windows UAC☆109Updated 5 years ago
- Dangerous Malwares☆204Updated 8 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆143Updated 5 years ago
- Simple example of how to remove all malwares from disk and registry.☆40Updated 5 years ago
- Carberp Banking Trojan☆113Updated 10 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Simple Malware Downloader☆122Updated 5 years ago
- JS Jscript - download file from url then run it☆59Updated 5 years ago
- ☆13Updated 2 years ago
- Carbanak leaked source☆71Updated 6 years ago
- RAT Museum☆105Updated 2 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆64Updated 7 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- Power Loader botnet☆39Updated 10 years ago
- Download a payload and make it run from registry without droppng.☆106Updated 6 years ago