petikvx / MSIL-MalwaresLinks
Sources Codes of many MSIL malwares
☆24Updated 3 years ago
Alternatives and similar repositories for MSIL-Malwares
Users that are interested in MSIL-Malwares are comparing it to the libraries listed below
Sorting:
- Source Code of MSIL Ransom☆14Updated 2 years ago
- ☆20Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Process injection via KernelCallbackTable☆13Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Listing UDP connections with remote address without sniffing.☆31Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- a small wiper malware programmed in c#☆58Updated 3 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Collaborative malware exchange repository.☆33Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆66Updated 2 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Updated last year
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Progress of learning kernel development☆14Updated 3 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 6 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆44Updated 5 years ago
- Decompiled NotPetya File Encryptor Code☆16Updated 3 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- ☆37Updated 8 months ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago