runvirus / LokiPWS
Loki PWS - Control Panel New Version leaked
☆22Updated 6 years ago
Alternatives and similar repositories for LokiPWS:
Users that are interested in LokiPWS are comparing it to the libraries listed below
- RIG Exploit Kit (front end)☆30Updated 10 years ago
- https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!☆31Updated 6 years ago
- Tinba Banking Trojan☆84Updated 10 years ago
- Alina Spark - Point of Sales Trojan☆46Updated 10 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Power Loader botnet☆39Updated 10 years ago
- Random stuff☆16Updated 6 years ago
- Ring3 Rootkit Backdoor.☆41Updated 9 years ago
- Dexter v2 - Point of Sales Trojan☆26Updated 10 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- ☆26Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆43Updated 7 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆131Updated 11 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Alina POS Source Code + Rootkit☆23Updated 9 years ago
- Bot simples para manter acesso em máquinas Windows.☆29Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- Malware Dump☆20Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆23Updated 10 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- A project to learn about malware and c++ coding☆22Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- Python script to inject and run shellcodes through TLS callbacks☆50Updated 9 years ago
- Example of malicious codes for educational purpose, don't make shit with that☆28Updated 6 years ago
- ☆30Updated 8 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- A simple reflective dll example☆19Updated 8 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆14Updated 5 years ago