onx / CASCADELinks
Source code for the Cascade virus
☆26Updated 9 years ago
Alternatives and similar repositories for CASCADE
Users that are interested in CASCADE are comparing it to the libraries listed below
Sorting:
- Hundreds of 20th Century viruses; clone this repository to upset your AV☆220Updated 3 years ago
- Writes a custom message to your master boot record, inspired by XKCD☆15Updated 10 years ago
- Vxheaven.org website's mirror☆175Updated 7 years ago
- Source codes of malwares, stress tests etc. for computer.☆38Updated 5 years ago
- Personal research and publication on malware families☆142Updated 10 months ago
- Carberp Banking Trojan☆124Updated 10 years ago
- Carbanak leaked source☆78Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- FUZZBUNCH - NSA security tools☆79Updated 8 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.☆42Updated 7 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- A simple attack against gcc and Python via kernel module, with highly detailed comments.☆25Updated 11 years ago
- Angecryption implementation in Python☆16Updated 6 years ago
- NoNameOS is a simple 32 bit x86 Operating System!☆127Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- RAT Museum☆105Updated 2 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- arp-poison (aka arp spoof) tool☆42Updated 12 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago
- Mirai Botnet Client, Echo Loader and CNC source code (for the sake of knowledge)☆99Updated 8 years ago
- Metamorphic Permutating High-Obfuscating Reassembler. Coded by The Mental Driller/29A.☆26Updated 12 years ago
- ☆39Updated 8 years ago
- Simple C++ ransomware, prove the concept.☆26Updated 8 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆49Updated 10 years ago
- Malware captured with honeypots☆38Updated 8 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- Power Loader botnet☆42Updated 10 years ago