research-virus / net-traveler
Public open-source code of malware NetTraveler (aka TravNet).
☆36Updated 9 years ago
Alternatives and similar repositories for net-traveler:
Users that are interested in net-traveler are comparing it to the libraries listed below
- Public open-source code of malware Shamoon (aka Disttrack).☆36Updated 9 years ago
- Various Crypter Project☆51Updated 11 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Updated 6 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- Simple C++ ransomware, prove the concept.☆25Updated 8 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆41Updated 6 months ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 4 months ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆43Updated 7 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- Gozi-MBR-rootkit Bootkit Modified☆67Updated 8 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 6 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- A simple rootkit to hide a process☆46Updated 11 years ago
- ☆39Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- Simple AntiVirus Driver example☆37Updated 7 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentation…☆19Updated 7 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆43Updated 7 years ago
- Power Loader botnet☆39Updated 10 years ago
- A ready-made template for a project based on libpeconv.☆46Updated last month
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆21Updated 7 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- Class implementation of PowerLoader injection technique☆29Updated 8 years ago
- Infects PE files with a shellcode☆18Updated 6 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Program to leak anti-virus behaviour and such☆15Updated 5 years ago