werkamsus / Lilith
Lilith, C++ Cybersecurity Research Project
☆711Updated 4 years ago
Related projects: ⓘ
- Framework for building Windows malware, written in C++☆500Updated 3 years ago
- zeus-style banking trojan☆434Updated 7 years ago
- HTTP Botnet☆882Updated 3 years ago
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆836Updated 3 years ago
- LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)☆1,039Updated 5 years ago
- malware source codes☆537Updated last year
- Windows Crypter☆403Updated 7 years ago
- AntiVirus Evasion Tool☆1,637Updated 11 months ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆528Updated 7 years ago
- Botnet☆827Updated last year
- Python / C# Unmanaged PowerShell based RAT☆770Updated last year
- Windows Remote-Access-Trojan☆610Updated 7 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆578Updated 9 months ago
- C# RAT (Remote Administration Tool)☆281Updated 7 years ago
- Undetectable Windows Payload Generation☆1,551Updated last year
- ☆465Updated 3 years ago
- ☆453Updated this week
- Antivirus evasion project☆1,036Updated 2 years ago
- Fileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.☆1,598Updated last month
- This is the list of all rootkits found so far on github and other sites.☆1,259Updated last year
- virus collection source code☆409Updated last year
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,289Updated 3 years ago
- Malware sample library.☆547Updated 9 months ago
- ☆2,037Updated this week
- Python antivirus evasion tool☆1,382Updated 11 months ago
- Demos of various injection techniques found in malware☆790Updated 2 years ago
- Collection of Remote Administration Tool samples☆244Updated 9 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆973Updated 6 months ago
- Zero-Day Code Injection and Persistence Technique☆1,215Updated 2 years ago
- Python Decoders for Common Remote Access Trojans☆1,067Updated 2 months ago