petikvx / MSIL-Malwares
Sources Codes of many MSIL malwares
☆22Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for MSIL-Malwares
- ☆15Updated 2 years ago
- Source Code of MSIL Ransom☆13Updated last year
- Windows Malware Probe of Concept☆21Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆18Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Ransomeware attack in linux☆12Updated 6 years ago
- This repository will present all Information interest about Thanatos Ransomware after analysis☆8Updated 5 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 4 months ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Conti Ransomware Source Code☆17Updated 2 years ago
- Remote Administration Tool For Windows VB.NET☆9Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆18Updated last year
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆22Updated 4 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- How to bypass antivirus 2020☆7Updated 4 years ago
- Collection of ezine about virii☆13Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆24Updated 2 years ago
- Multipurpose malware framework☆22Updated 2 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 2 years ago
- Decompiled NotPetya File Encryptor Code☆12Updated 2 years ago