petikvx / MSIL-MalwaresLinks
Sources Codes of many MSIL malwares
☆24Updated 3 years ago
Alternatives and similar repositories for MSIL-Malwares
Users that are interested in MSIL-Malwares are comparing it to the libraries listed below
Sorting:
- Source Code of MSIL Ransom☆14Updated 2 years ago
- ☆20Updated 3 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆64Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- Dump certificates from PE files in different formats☆38Updated last year
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆24Updated 2 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- A simple packer working with all PE files which cipher your exe with a XOR implementation☆14Updated 5 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Updated last year
- Alleged source code leak of Osiris banking trojan☆36Updated 4 years ago
- Process injection via KernelCallbackTable☆13Updated 3 years ago
- Sources Codes of many Office Malwares☆17Updated 3 years ago
- Conti Ransomware Source Code☆20Updated 3 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16Updated last year
- a small wiper malware programmed in c#☆58Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Updated 2 years ago
- Collaborative malware exchange repository.☆33Updated 11 months ago
- malware development kit for x86 windows based platforms with a linux compatible build system☆10Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆16Updated 3 years ago
- Runs programs as TrustedInstaller☆49Updated 6 years ago
- ☆16Updated 4 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 6 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Updated 3 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- Another Portable Executable files analysing stuff☆21Updated 14 years ago