petikvx / MSIL-MalwaresLinks
Sources Codes of many MSIL malwares
☆24Updated 2 years ago
Alternatives and similar repositories for MSIL-Malwares
Users that are interested in MSIL-Malwares are comparing it to the libraries listed below
Sorting:
- Source Code of MSIL Ransom☆14Updated 2 years ago
- ☆19Updated 3 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Decompiled NotPetya File Encryptor Code☆14Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Updated 3 years ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- a small wiper malware programmed in c#☆59Updated 2 years ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Updated 3 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- ☆34Updated last year
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Reverse Engineering and Debugging Malware☆32Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- Collaborative malware exchange repository.☆35Updated 8 months ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 4 years ago
- ☆37Updated 5 months ago
- ☆16Updated 3 years ago
- An Xdbg Plugin of the ERC Library.☆26Updated last year
- This repository will present all Information interest about Thanatos Ransomware after analysis☆9Updated 6 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 9 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago