NOT MY CODE! Zeus trojan horse - leaked in 2011, I am not the author. This repository is for study purposes only, do not message me about your lame hacking attempts.
☆1,545Dec 8, 2020Updated 5 years ago
Alternatives and similar repositories for Zeus
Users that are interested in Zeus are comparing it to the libraries listed below
Sorting:
- ☆519Mar 12, 2018Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆3,288Sep 4, 2022Updated 3 years ago
- zeus-style banking trojan☆476Jun 26, 2017Updated 8 years ago
- Tinba Banking Trojan☆87Feb 25, 2015Updated 11 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆60Feb 10, 2017Updated 9 years ago
- malware source codes☆571Dec 16, 2022Updated 3 years ago
- Carberp Banking Trojan☆126Feb 25, 2015Updated 11 years ago
- Botnet☆943Feb 8, 2023Updated 3 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- Richkware is a modern C++20 framework for building educational malware agents. It provides a comprehensive, secure, and modular architect…☆540Jan 4, 2026Updated 2 months ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆12,826Nov 19, 2025Updated 4 months ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆9,235Oct 16, 2025Updated 5 months ago
- A Stealthy Trojan Spyware☆1,170Oct 20, 2025Updated 5 months ago
- Athena Botnet Source Code☆156Sep 25, 2015Updated 10 years ago
- Public open-source code of malware Stuxnet (aka MyRTUs).☆1,190Aug 27, 2022Updated 3 years ago
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.☆6,885Mar 1, 2026Updated 2 weeks ago
- Demos of various injection techniques found in malware☆794Feb 15, 2022Updated 4 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code. Code mostly from: http://www.malwaretech.com☆1,149Apr 14, 2025Updated 11 months ago
- Leaked Linux.Mirai Source Code for Research/IoC Development Purposes☆570Feb 17, 2017Updated 9 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,948Mar 22, 2024Updated last year
- Defund the Police.☆13,523Jun 7, 2024Updated last year
- Rovnix Bootkit☆121Feb 25, 2015Updated 11 years ago
- A Linux Ransomware☆768Jan 24, 2025Updated last year
- A collection of malware samples caught by several honeypots i manage☆1,800Sep 15, 2021Updated 4 years ago
- Patch PE, ELF, Mach-O binaries with shellcode new version in development, available only to sponsors☆3,431Oct 30, 2023Updated 2 years ago
- virus collection source code☆503Feb 8, 2023Updated 3 years ago
- Python botnet and backdoor☆1,613Mar 2, 2023Updated 3 years ago
- Collection of ancient computer virus source codes☆650Nov 26, 2021Updated 4 years ago
- RCS Soldier for Windows☆78Jul 6, 2015Updated 10 years ago
- PowerLoaderEx - Advanced Code Injection Technique for x32 / x64☆382Apr 17, 2017Updated 8 years ago
- A POC Windows crypto-ransomware (Academic). Now Ransom:Win32/MauriCrypt.MK!MTB☆957Nov 17, 2018Updated 7 years ago
- Course materials for Malware Analysis by RPISEC☆4,003Aug 26, 2022Updated 3 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,086Mar 17, 2024Updated 2 years ago
- Second Version of The GoBot Botnet, But more advanced.☆758Sep 24, 2021Updated 4 years ago
- HTTP Botnet☆919Oct 27, 2020Updated 5 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Windows Crypter☆425Dec 28, 2016Updated 9 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆3,243Sep 3, 2022Updated 3 years ago
- Gozi-MBR-rootkit Bootkit Modified☆69Oct 25, 2016Updated 9 years ago