utoni / w32millerLinks
malware development kit for x86 windows based platforms with a linux compatible build system
☆10Updated 2 years ago
Alternatives and similar repositories for w32miller
Users that are interested in w32miller are comparing it to the libraries listed below
Sorting:
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- Windows Malware Probe of Concept☆21Updated 3 years ago
- Decompiled NotPetya File Encryptor Code☆15Updated 3 years ago
- ClipBanker Spy Trojan☆11Updated last year
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆19Updated last year
- Process injection via KernelCallbackTable☆13Updated 3 years ago
- Infects PE files with a shellcode☆19Updated 6 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated 2 years ago
- Simple little rootkit made in C☆13Updated 4 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆56Updated last month
- Ammyy v3 Source Code leak , with ❤️ <3☆40Updated 8 years ago
- Simple remote administration tool. Written in c++ and MASM.☆18Updated 7 years ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Get/dump chrome and firefox saved passwords.☆20Updated 5 years ago
- Silent Monero (XMR) CPU miner☆23Updated 7 years ago
- ☆19Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- TaskMgr Volatile Environment LPE☆15Updated 2 months ago
- DarkRats Standalone HVNC☆24Updated 3 years ago
- DarkRat source - beware untested source and resources.☆22Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13Updated 3 years ago
- 🚀 Builder of Malware Loader☆13Updated 4 years ago
- Joker Botnet Source LEAKED☆12Updated 4 years ago
- Dump mapped PE files from memory to the disk☆20Updated 6 years ago