research-virus / shamoon
Public open-source code of malware Shamoon (aka Disttrack).
☆33Updated 9 years ago
Alternatives and similar repositories for shamoon:
Users that are interested in shamoon are comparing it to the libraries listed below
- Public open-source code of malware NetTraveler (aka TravNet).☆35Updated 9 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- Various Crypter Project☆52Updated 10 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆41Updated 7 years ago
- Simple C++ ransomware, prove the concept.☆25Updated 7 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆52Updated 3 years ago
- ☆39Updated 7 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆82Updated 4 years ago
- A Unix rootkit☆16Updated 4 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 10 years ago
- Ammyy v3 Source Code leak , with ❤️ <3☆37Updated 8 years ago
- The Grum Spam Bot☆20Updated 9 years ago
- Simple windows backdoor command shell.☆20Updated 7 years ago
- Another Portable Executable files analysing stuff☆20Updated 13 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- KINS Banking Trojan☆62Updated 9 years ago
- Power Loader botnet☆39Updated 9 years ago
- inPEct means "infect", applicable to PE ("Portable Executable") format. It is an executable binder, thus, it's able to join two .exe file…☆21Updated 14 years ago
- Archive of ransomware decryptors☆29Updated 7 years ago
- A simple rootkit to hide a process☆46Updated 11 years ago
- ☆23Updated 8 years ago
- Hidden kernel mode code execution for bypassing modern anti-rootkits.☆82Updated 14 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆57Updated 7 years ago
- fun rootkits stuff!☆17Updated 9 years ago
- Rootkit Arsenal 2nd Source Code☆14Updated 11 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆19Updated 6 years ago
- ☆26Updated 7 years ago