zeus-style banking trojan
☆475Jun 26, 2017Updated 8 years ago
Alternatives and similar repositories for TinyNuke
Users that are interested in TinyNuke are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Standalone HVNC client and server, based on TinyNuke.☆506May 14, 2026Updated last week
- Botnet system from deep-web Russians forums. Tiny Nuke!☆94Jul 13, 2017Updated 8 years ago
- Gozi ISFB is a well-known and widely distributed banking trojan, and has been in the threat landscape for the past several years.☆71Mar 13, 2018Updated 8 years ago
- Carberp Banking Trojan☆128Feb 25, 2015Updated 11 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- using VBS to download and install a powershell malware☆37Jun 28, 2019Updated 6 years ago
- Power Loader botnet☆38Feb 25, 2015Updated 11 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Tinba Banking Trojan☆88Feb 25, 2015Updated 11 years ago
- Example application for creating multiple desktops on Windows☆138Jun 8, 2018Updated 7 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,558Dec 8, 2020Updated 5 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ChimeraPE (a PE injector type - alternative to: RunPE, ReflectiveLoader, etc) - a template for manual loading of EXE, loading imports pay…☆229Mar 22, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆13Jan 28, 2017Updated 9 years ago
- Rovnix Bootkit☆122Feb 25, 2015Updated 11 years ago
- A crappy hook on SpAcceptLsaModeContext that prints incoming auth attempts. WIP☆38Jul 27, 2021Updated 4 years ago
- Converts PE into a shellcode☆2,761Aug 30, 2025Updated 8 months ago
- 基于Tinynuke修复得到的HVNC☆194Sep 4, 2021Updated 4 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 4 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆460Oct 25, 2021Updated 4 years ago
- Exploitkit☆188Dec 10, 2016Updated 9 years ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆2,145Apr 28, 2026Updated 3 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode☆2,527Nov 15, 2023Updated 2 years ago
- Open Source C++ Crypter. AES-256 Bit Encryption, Virtual Machine Detection and Almost FUD☆128May 8, 2021Updated 5 years ago
- Alina Spark - Point of Sales Trojan☆50Feb 25, 2015Updated 11 years ago
- Executing a .NET Assembly from C++ in Memory (CLR Hosting)☆200Nov 12, 2016Updated 9 years ago
- Phantom DLL hollowing PoC☆373May 23, 2022Updated 3 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- Crypter, binder & downloader with native & .NET stub, evasive by design, user friendly UI☆735Jun 28, 2025Updated 10 months ago
- PoC designed to evade userland-hooking anti-virus.☆90May 15, 2019Updated 7 years ago
- Evasive shellcode loader for bypassing event-based injection detection (PoC)☆829Aug 23, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Small and convenient C2 tool for Windows targets☆615Mar 8, 2022Updated 4 years ago
- malware source codes☆579Dec 16, 2022Updated 3 years ago
- Historical Windows temporal memory-state research artifact for studying time-bound memory observations, validation limits, and defensive …☆904May 15, 2026Updated last week
- DarkRat source - beware untested source and resources.☆22Dec 7, 2019Updated 6 years ago
- A more stealthy variant of "DLL hollowing"☆365Mar 8, 2024Updated 2 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70May 9, 2019Updated 7 years ago