Sources Codes of many MSIL malwares
☆24Aug 29, 2022Updated 3 years ago
Alternatives and similar repositories for MSIL-Malwares
Users that are interested in MSIL-Malwares are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- A curated malware database with more then +73000 samples.☆20Feb 20, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Convert native dll to shellcode, and support exported function☆25Feb 10, 2021Updated 5 years ago
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- ☆13Sep 26, 2020Updated 5 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Open malware analysis / reversing database☆11Jun 14, 2021Updated 4 years ago
- 📦 de4dot deobfuscator with full support for VirtualGuard☆23Apr 7, 2023Updated 2 years ago
- Small malware made by me for educational & entertainment purposes. It modifies some registry keys, make copies of it self, overwrites the…☆15Jan 10, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- IndoXploit Webshell V.3☆15Oct 31, 2019Updated 6 years ago
- Scans a malware file and lists down the related MBC (Malware Behavior Catalog) details.☆22Jul 11, 2022Updated 3 years ago
- Modified Version of Melkor @FuzzySecurity capable of creating disposable AppDomains in injected processes.☆28Sep 8, 2021Updated 4 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- Tracing library for Winsock calls.☆29Mar 6, 2026Updated 3 weeks ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Nov 12, 2017Updated 8 years ago
- Malwares are here☆25Jan 16, 2025Updated last year
- ☆127Mar 7, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- I'm NOT responsible for ANY damages caused by my malwares!☆25Mar 20, 2026Updated last week
- ☆17Aug 18, 2022Updated 3 years ago
- ☆16Jan 9, 2023Updated 3 years ago
- Shared library injection for *nix using ptrace, in Rust.☆24Aug 13, 2024Updated last year
- Simple bruteforcer for EDA2/HiddenTear based ransomware.☆27May 14, 2016Updated 9 years ago
- Please. Do not run this file on your or another computer !!! Use this file for educational purposes only !!! I am not responsible for the…☆13Dec 17, 2020Updated 5 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- This is my ransomware from my video: https://www.youtube.com/watch?v=niRclD6ewXA&t=11s&ab_channel=CYBERSOLDIER☆18Apr 12, 2022Updated 3 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ILReplacer, A Tool to Find and Replace .Net Application IL Code Instructions (Patcher)☆22Oct 15, 2019Updated 6 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- Tool to unpack .net assemblies packed by BoxedAppPacker☆25Sep 11, 2017Updated 8 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- Deobfuscator for Confuser 1.9.0.0 release☆166Apr 25, 2018Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago