petikvx / MSIL-MalwaresLinks
Sources Codes of many MSIL malwares
☆24Updated 3 years ago
Alternatives and similar repositories for MSIL-Malwares
Users that are interested in MSIL-Malwares are comparing it to the libraries listed below
Sorting:
- Source Code of MSIL Ransom☆14Updated 2 years ago
- ☆19Updated 3 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- NT AUTHORITY\SYSTEM☆38Updated 5 years ago
- ☆16Updated 3 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 10 months ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 5 years ago
- Listing UDP connections with remote address without sniffing.☆29Updated last year
- Simple dotnet Native AOT app that uses AsmResolver to convert shellcode to PE☆65Updated 2 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- x64 Registration-Free In-Process COM Automation Server.☆49Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆55Updated 3 weeks ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Updated last year
- Collaborative malware exchange repository.☆35Updated 9 months ago
- Standalone Metasploit-like XOR encoder for shellcode☆48Updated last year