werkamsus / LilithLinks
Lilith - Foundational reverse engineering resource for cybersecurity entrepreneurs in C++
☆740Updated 5 years ago
Alternatives and similar repositories for Lilith
Users that are interested in Lilith are comparing it to the libraries listed below
Sorting:
- Framework for building Windows malware, written in C++☆536Updated 10 months ago
- zeus-style banking trojan☆467Updated 8 years ago
- ☆498Updated 5 years ago
- Windows Crypter☆422Updated 8 years ago
- HTTP Botnet☆912Updated 5 years ago
- Windows Remote-Access-Trojan☆693Updated 8 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆550Updated last month
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,116Updated 6 years ago
- Botnet☆927Updated 2 years ago
- malware source codes☆565Updated 2 years ago
- Kernel rootkit, that lives inside the Windows registry values data☆502Updated 8 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,006Updated 4 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆633Updated last year
- AntiVirus Evasion Tool☆1,731Updated 7 months ago
- ransomware open-sources☆786Updated 5 years ago
- Antivirus evasion project☆1,149Updated 10 months ago
- Collection of Remote Administration Tool samples☆260Updated 10 years ago
- C# RAT (Remote Administration Tool)☆298Updated 8 years ago
- Python / C# Unmanaged PowerShell based RAT☆773Updated 2 years ago
- Malware sample library.☆585Updated 2 years ago
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆397Updated 5 years ago
- A Linux Ransomware☆759Updated 10 months ago
- This is the list of all rootkits found so far on github and other sites.☆1,394Updated 3 months ago
- virus collection source code☆490Updated 2 years ago
- Converts a DLL into EXE☆818Updated 2 years ago
- Simple obfuscation tool☆533Updated last year
- njRAT SRC Extract☆292Updated 8 years ago
- ☆822Updated 5 years ago
- Post-exploitation tool for hiding processes from monitoring applications☆744Updated 2 years ago
- NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about…☆1,526Updated 4 years ago