research-virus / shamoon
Public open-source code of malware Shamoon (aka Disttrack).
☆36Updated 9 years ago
Alternatives and similar repositories for shamoon:
Users that are interested in shamoon are comparing it to the libraries listed below
- Public open-source code of malware NetTraveler (aka TravNet).☆36Updated 9 years ago
- Various Crypter Project☆51Updated 11 years ago
- Simple C++ ransomware, prove the concept.☆25Updated 8 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆43Updated 7 years ago
- Project aimed at creating a malware able to evolve and adapt to the various host machines through metamorphic modifications, spontaneous …☆43Updated 7 years ago
- APT, Cyber warfare, Penetration testing, Zero-day,Exploiting,Fuzzing,Privilege-Escalation,browser-security,Spyware,Malwres evade…☆34Updated 6 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆53Updated 3 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- A Unix rootkit☆16Updated 4 years ago
- Sysprep Volatile Environment LPE (2017)☆14Updated 4 months ago
- NT AUTHORITY\SYSTEM☆39Updated 4 years ago
- ☆39Updated 7 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆63Updated 7 years ago
- Fileless persistence, attacks and anti-forensic capabilties.☆90Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆41Updated 6 months ago
- Archive of ransomware decryptors☆29Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆10Updated 6 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- Process Hollowing techniques as used in many file Crypters (C/C++)☆84Updated 4 years ago
- The Grum Spam Bot☆20Updated 10 years ago
- Carbanak leaked source☆68Updated 6 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆75Updated 2 years ago
- Exploits pack for the Windows Kernel mode driver HackSysExtremeVulnerableDriver written for educational purposes.☆65Updated 3 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- A MITM proxy server for reflective DLL injection through WinINet☆15Updated 6 years ago