A stealth URL toolkit optimized for bypassing censorship filters and/or ...
We developed a malware for educational purposes. In particular, our goal...
Russian Wipers Dropper (educational-purposes )
A collection of techniques commonly used in malware to accomplish core t...
? [penetration testing Book], Kali Magic, Cryptography, Hash Crack, Botn...
Created a VERY SIMPLE remote access Trojan that will establish administr...
C# Malware that Steal Discord Token Directly From Memory and bypass any ...
Some POCs for my BYOVD research
Dimorf is a ransomware using 256-bit AES with a self-destructing, random...
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capa...
Firefox webInjector capable of injecting codes into webpages using a mit...
ShadowForge Command & Control - Harnessing the power of Zoom's API, cont...
PoC showcasing new DarkGate Install Script retrieval technique via DNS T...
A book covering the whole spectrum of Malware
Malware and malicious applications database