a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware you can search on wikipedia
☆14Jan 29, 2021Updated 5 years ago
Alternatives and similar repositories for malwareCode
Users that are interested in malwareCode are comparing it to the libraries listed below
Sorting:
- A MQL5 Smart-Money-Concepts bot that trades Order Blocks, FVGs, and BOS with adaptive ATR/session/regime filters, equity “bagging” risk c…☆39Nov 22, 2025Updated 3 months ago
- MalwareDB main project repo.☆16Feb 28, 2021Updated 5 years ago
- Anti-VM, malware sandbox detection and evasion.☆14Jun 13, 2022Updated 3 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- A tool to teleport shellcode to victim's device without triggering IDS or AV 100% FUD☆16Aug 23, 2022Updated 3 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆14Dec 30, 2023Updated 2 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- Windows file system driver which allows to block access to files at run-time (C/C++, C#, WDK, SDK)☆13Jan 1, 2023Updated 3 years ago
- Variety of different process injections implemented in C++☆26May 2, 2021Updated 4 years ago
- A simple SOCKS library used in ConnectBot.☆15Mar 6, 2023Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- Glasgow Haskell Cross-Compiler targeting Android☆13Mar 31, 2025Updated 11 months ago
- MBR virus☆25Jun 25, 2021Updated 4 years ago
- ☆13Jan 30, 2026Updated last month
- 恶意软件原理图☆59Mar 29, 2021Updated 4 years ago
- ☆11Oct 11, 2016Updated 9 years ago
- ☆10Oct 8, 2022Updated 3 years ago
- PoC for distributed NTP reflection DoS (CVE-2013-5211)☆10Oct 4, 2019Updated 6 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- Collection of structures, prototype and examples for Microsoft Macro Assembler (MASM) x64.☆16Aug 18, 2020Updated 5 years ago
- Easily create an anonymous VPN and Proxy with Digital Ocean, no logs, destroy at any time with no trace.☆11Mar 24, 2020Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Alternatif Google Maps API Menggunakan Open Street Map☆11Feb 28, 2022Updated 4 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- A Simple Script For SSH BruteForce☆38Aug 4, 2023Updated 2 years ago
- EDR/AV Simulation for Malware Development☆13Oct 21, 2023Updated 2 years ago
- 简易远程桌面控制☆14Aug 22, 2020Updated 5 years ago
- Membuat Aplikasi Kamus Besar Bahasa Indonesia dengan Android Studio☆10Mar 23, 2021Updated 4 years ago
- attachments for forum of RealWorld CTF 3rd☆42Jan 7, 2021Updated 5 years ago
- A Ruby Gem for interacting with Android API from within Termux☆18Mar 24, 2019Updated 6 years ago
- awesome resources about cloud security 🐿☆20Dec 2, 2021Updated 4 years ago
- rplidar for ROS 2 Humble Hawksbill and Ubuntu 22.04☆44Sep 11, 2022Updated 3 years ago
- The OUR (Our User-made Repository)☆10Nov 10, 2024Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- Ophcrack : Windows password cracker based on rainbow tables☆16Sep 25, 2015Updated 10 years ago
- MSBuild AL bypass☆17Mar 9, 2023Updated 3 years ago
- Sign a paper digitally using QR codes and GPG☆23Jul 15, 2012Updated 13 years ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago