zeus-style banking trojan
☆476Jun 26, 2017Updated 8 years ago
Alternatives and similar repositories for TinyNuke
Users that are interested in TinyNuke are comparing it to the libraries listed below
Sorting:
- Standalone HVNC Client & Server | Written in C++ (Modified Tinynuke)☆487Dec 3, 2025Updated 3 months ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆94Jul 13, 2017Updated 8 years ago
- Carberp Banking Trojan☆126Feb 25, 2015Updated 11 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆72Mar 13, 2018Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- Power Loader botnet☆40Feb 25, 2015Updated 11 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Example application for creating multiple desktops on Windows☆140Jun 8, 2018Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆229Mar 22, 2023Updated 2 years ago
- ☆13Jan 28, 2017Updated 9 years ago
- Tinba Banking Trojan☆87Feb 25, 2015Updated 11 years ago
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,503Nov 15, 2023Updated 2 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆129May 8, 2021Updated 4 years ago
- Converts PE into a shellcode☆2,745Aug 30, 2025Updated 6 months ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,101Feb 19, 2026Updated last week
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70May 9, 2019Updated 6 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆201Nov 12, 2016Updated 9 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆47Jan 19, 2018Updated 8 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,540Dec 8, 2020Updated 5 years ago
- malware source codes☆570Dec 16, 2022Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- A more stealthy variant of "DLL hollowing"☆363Mar 8, 2024Updated last year
- Demos of various (also non standard) persistence methods used by malware☆224Mar 5, 2023Updated 2 years ago
- 基于Tinynuke修复得到的HVNC☆189Sep 4, 2021Updated 4 years ago
- Phantom DLL hollowing PoC☆370May 23, 2022Updated 3 years ago
- Demos of various injection techniques found in malware☆796Feb 15, 2022Updated 4 years ago
- A memory scanning evasion technique☆899May 24, 2017Updated 8 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆37Jul 27, 2021Updated 4 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆457Oct 25, 2021Updated 4 years ago
- Alina Spark - Point of Sales Trojan☆49Feb 25, 2015Updated 11 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 8 years ago
- Some interesting code☆18Jan 16, 2015Updated 11 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆824Aug 23, 2021Updated 4 years ago
- Rovnix Bootkit☆121Feb 25, 2015Updated 11 years ago