phoenixlzx / flame-sourcecodeLinks
Flame malware sourcecode available !!
☆50Updated 13 years ago
Alternatives and similar repositories for flame-sourcecode
Users that are interested in flame-sourcecode are comparing it to the libraries listed below
Sorting:
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆71Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆59Updated 8 years ago
- Dangerous Malwares☆211Updated 8 years ago
- Carberp Banking Trojan☆123Updated 10 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆38Updated 10 years ago
- Athena Botnet Source Code☆153Updated 10 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- XOR encryption, malware crypter☆96Updated 11 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Tinba Banking Trojan☆87Updated 10 years ago
- Vxheaven.org website's mirror☆173Updated 7 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆90Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- Exploitkit☆186Updated 8 years ago
- An open source RansomWare☆88Updated 5 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Ransomeware☆46Updated 8 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆124Updated 8 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆130Updated 4 years ago
- ZeroAccess v3 toolkit☆165Updated 7 years ago
- CryptoLocker is open source files encrypt-er. Crypto is developed in Visual C++. It has features encrypt all file, lock down the system a…☆140Updated 2 years ago
- Malware captured with honeypots☆38Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆35Updated 6 years ago
- The GTK Keylogger☆19Updated 2 years ago
- Windows Crypter☆420Updated 8 years ago
- ☆227Updated 9 years ago
- Metamorphic Permutating High-Obfuscating Reassembler. Coded by The Mental Driller/29A.☆26Updated 12 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Windows XP 32-Bit Bootkit☆146Updated 10 years ago
- Simple C++ ransomware, prove the concept.☆26Updated 8 years ago