yocontra / PEIK
Properly Engineered Infection Kit, A framework for creating malware in C#. Multi-threaded, comes with a built-in MSIL obfuscator and packer to prevent detection
☆15Updated 13 years ago
Related projects ⓘ
Alternatives and complementary repositories for PEIK
- Just some sources from forever ago (none were made by me)☆7Updated 6 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆28Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆9Updated 5 years ago
- A Remote Administration Tool coded in C#☆20Updated 12 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆16Updated 4 years ago
- Web Based Crypter☆7Updated 10 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 6 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- Penetration Testing Tool for Windows 7 => 10☆15Updated 6 years ago
- Post-explotation Hacks☆14Updated 5 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆15Updated 9 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 11 years ago
- Common Malware Techniques☆13Updated last year
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Simple shellcode injector.☆13Updated 5 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Updated 4 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Updated 6 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago