phoenixlzx / flame-sourcecodeLinks
Flame malware sourcecode available !!
☆50Updated 13 years ago
Alternatives and similar repositories for flame-sourcecode
Users that are interested in flame-sourcecode are comparing it to the libraries listed below
Sorting:
- Carberp Banking Trojan☆123Updated 10 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- this is the source code of the stuxnet virus only for educational purpose or malware analysic☆71Updated 8 years ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Tinba Banking Trojan☆87Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 6 years ago
- Public open-source code of malware Shamoon (aka Disttrack).☆37Updated 10 years ago
- Dangerous Malwares☆212Updated 8 years ago
- Athena Botnet Source Code☆154Updated 10 years ago
- An open source RansomWare☆89Updated 5 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆90Updated 10 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- XOR encryption, malware crypter☆96Updated 11 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Simple C++ ransomware, prove the concept.☆26Updated 8 years ago
- ☆42Updated 8 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆85Updated 5 years ago
- Ransomeware☆46Updated 8 years ago
- Example crypter is a project demonstrating how files can be encrypted and injected into memory using a stub file.☆72Updated 9 years ago
- Zero-Day Code Injection and Persistence Technique☆29Updated 8 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆130Updated 4 years ago
- Metamorphic Permutating High-Obfuscating Reassembler. Coded by The Mental Driller/29A.☆26Updated 12 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago
- Passive UAC elevation using dll infection☆75Updated 10 years ago
- ZeroAccess v3 toolkit☆165Updated 7 years ago
- Malware captured with honeypots☆38Updated 8 years ago
- TDL4 style rootkit to spoof read/write requests to master boot record☆130Updated 7 years ago
- Incarcero is a tool that creates Virtual Machines (VMs) preconfigured with malware analysis tools and security settings tailored for malw…☆91Updated last year
- Windows Crypter☆424Updated 8 years ago
- ☆39Updated 8 years ago