petikvx / MSIL-Malwares
Sources Codes of many MSIL malwares
☆23Updated 2 years ago
Alternatives and similar repositories for MSIL-Malwares:
Users that are interested in MSIL-Malwares are comparing it to the libraries listed below
- Source Code of MSIL Ransom☆13Updated 2 years ago
- ☆16Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆21Updated last year
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 9 months ago
- Dump certificates from PE files in different formats☆38Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 8 months ago
- Some ELF Malwares☆9Updated 3 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆14Updated 4 months ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆14Updated 3 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 6 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- a small wiper malware programmed in c#☆51Updated 2 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated last year
- A utility that can be used to launch an executable with a DLL injected☆18Updated last year
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Basic disassembly technique to slow down disasm process☆10Updated 5 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- DarkRats Standalone HVNC☆24Updated 2 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆38Updated 3 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- A PoC to demo modifying cmdline of the child process dynamically. It might be useful against process log tracing, AV or EDR.☆39Updated 4 years ago
- Decrypt Wireless Passwords On Windows☆14Updated 4 years ago
- ☆16Updated 6 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago