☆19Mar 21, 2020Updated 5 years ago
Alternatives and similar repositories for malware_decompiled_code
Users that are interested in malware_decompiled_code are comparing it to the libraries listed below
Sorting:
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Overwrites the whole PE Header☆20Apr 20, 2020Updated 5 years ago
- A proof of concept of real custom GetProcAddress and GetModuleBaseAddress☆21Jul 9, 2022Updated 3 years ago
- Example managed and unmanaged plugins for CoreHook☆14Mar 3, 2019Updated 6 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Making the .NET runtime do stuff it's not even supposed to do!☆14Mar 25, 2016Updated 9 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Software Protector☆19Aug 16, 2020Updated 5 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- ☆20Jul 23, 2023Updated 2 years ago
- User-mode part of Zerokit platform☆22Mar 30, 2019Updated 6 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Jul 2, 2019Updated 6 years ago
- Plugin-based obfuscator☆14Jun 13, 2019Updated 6 years ago
- A sleek remote administration tool☆12Jan 30, 2021Updated 5 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- A simple dnSpy extension for easily renaming members.☆20May 27, 2023Updated 2 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Windows Application Loader Running *.Exe files in Memory against Scrylla☆21Dec 20, 2019Updated 6 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- A simple to use, gui based program for patching .NET assemblies☆39Jun 5, 2022Updated 3 years ago
- Small POC for process ghosting☆40Feb 1, 2022Updated 4 years ago
- Фреймвор к криптора/протектора с антиэмуляцией☆32Jun 15, 2019Updated 6 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- PoC for DEF CON 26: Playing Malware Injection with Exploit thoughts☆25Aug 17, 2018Updated 7 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Framework for C# development☆70Feb 14, 2026Updated last week
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- rsnapshot for Docker☆11Jun 22, 2022Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- Modded version of KoiVM☆12Aug 17, 2019Updated 6 years ago
- Human Resources Management System☆12Apr 5, 2019Updated 6 years ago
- Simple code to resolve library functions at runtime☆10Jan 5, 2015Updated 11 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago