werkamsus / LilithLinks
Lilith - Foundational reverse engineering resource for cybersecurity entrepreneurs in C++
☆741Updated 5 years ago
Alternatives and similar repositories for Lilith
Users that are interested in Lilith are comparing it to the libraries listed below
Sorting:
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆535Updated last month
- zeus-style banking trojan☆473Updated 8 years ago
- HTTP Botnet☆913Updated 5 years ago
- Windows Crypter☆424Updated 9 years ago
- ☆508Updated 5 years ago
- Windows Remote-Access-Trojan☆709Updated 9 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,119Updated 6 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆554Updated 4 months ago
- malware source codes☆570Updated 3 years ago
- ransomware open-sources☆794Updated 5 years ago
- Collection of Remote Administration Tool samples☆263Updated 10 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆1,027Updated 4 years ago
- AntiVirus Evasion Tool☆1,739Updated 9 months ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆634Updated last year
- C# RAT (Remote Administration Tool)☆300Updated 8 years ago
- Botnet☆936Updated 3 years ago
- Antivirus evasion project☆1,153Updated last year
- Windows 8.1 and 10 UAC bypass abusing WinSxS in "dccw.exe".☆401Updated 5 years ago
- A Linux Ransomware☆762Updated last year
- Kernel rootkit, that lives inside the Windows registry values data☆505Updated 8 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Updated 2 years ago
- virus collection source code☆501Updated 3 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆994Updated 2 years ago
- Post-exploitation tool for hiding processes from monitoring applications☆746Updated 2 years ago
- Simple obfuscation tool☆544Updated last year
- Demos of various injection techniques found in malware☆797Updated 3 years ago
- Malware sample library.☆592Updated 2 years ago
- Python Decoders for Common Remote Access Trojans☆1,116Updated last year
- Zero-Day Code Injection and Persistence Technique☆1,248Updated 3 years ago
- njRAT SRC Extract☆295Updated 9 years ago