research-virus / shamoon
Public open-source code of malware Shamoon (aka Disttrack).
☆32Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for shamoon
- Public open-source code of malware NetTraveler (aka TravNet).☆34Updated 9 years ago
- Various Crypter Project☆51Updated 10 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆41Updated 7 years ago
- Archive of ransomware decryptors☆29Updated 6 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆51Updated 2 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 10 years ago
- Simple C++ ransomware, prove the concept.☆25Updated 7 years ago
- Bootkits Revisited☆41Updated 10 years ago
- ☆21Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Simple windows backdoor command shell.☆20Updated 6 years ago
- A DLL that performs IAT hooking☆26Updated 6 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- A minimal tool to extract shellcode from 64-bit PE binaries.☆49Updated 3 years ago
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆82Updated 4 years ago
- Another Portable Executable files analysing stuff☆18Updated 13 years ago
- The Grum Spam Bot☆20Updated 9 years ago
- ☆39Updated 7 years ago
- Ransomware Using CryptoAPI☆13Updated 6 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆27Updated 10 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆39Updated 2 months ago
- inPEct means "infect", applicable to PE ("Portable Executable") format. It is an executable binder, thus, it's able to join two .exe file…☆21Updated 14 years ago
- Notes about reverse engineering the Petya2017 ransomware☆18Updated 7 years ago
- ☆17Updated 5 years ago
- A small library helping to parse commandline parameters (for C/C++)☆53Updated last year
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 7 years ago
- TaskMgr Volatile Environment LPE☆12Updated 2 years ago