Malware
Malware can take various forms, including viruses, worms, Trojans, ransomware, spyware, and more. Its primary goal is to compromise the integrity, confidentiality, or availability of information, often for financial gain, espionage, or other malicious purposes.
Here are 211 public repositories matching this topic...
Leaked Linux.Mirai Source Code for Research/IoC Development Purposes
-
Updated
Feb 17, 2017 - C
WannaCry|WannaDecrypt0r decompiled
-
Updated
May 16, 2017 - C
Malware Behavior Analyzer
-
Updated
Jun 1, 2017 - C
Kernel rootkit, that lives inside the Windows registry values data
-
Updated
Oct 8, 2017 - C
Ransomware without the ransom | Targeted at Linux systems
-
Updated
Nov 11, 2017 - C
A simple ELF Virus that can execute malacious code, infect other ELF files, and execute the host file's code normally.
-
Updated
Apr 22, 2018 - C
Like MEMZ,But Really Has Dirrfent Trojan Codes
-
Updated
Jul 13, 2018 - C
This is a virus removal (protection) tool for a virus commonly known as "Dulla virus" and several weeks later by A/V vendors Win32.Agent.cb. Motivation of the work: even though this PE infector is very dangerous and was stealthily spreading fast, the major A/V companies failed to respond to this threat. Hence, needed to make own removal and prot…
-
Updated
Aug 13, 2018 - C
- Followers
- 373 followers
- Wikipedia
- Wikipedia