Skip to content

Latest commit

 

History

History
37 lines (32 loc) · 1.35 KB

README.md

File metadata and controls

37 lines (32 loc) · 1.35 KB

malware

Malware source code samples uploaded to GitHub for those who want to analyze the code.

  • Alina Spark (Point of Sales Trojan)
  • Bleeding Life 2 (Exploit Pack)
  • Carberp (Botnet)
  • Carberp (Banking Trojan)
  • Crimepack 3.1.3 (Exploit Pack)
  • Dendroid (Android Trojan)
  • Dexter v2 (Point of Sales Trojan)
  • Eda2, Stolich, Win32.Stolich (Ransom)
  • Sednit, Fancy Bear, APT28, Sofacy, Strontium (Gmail C2C)
  • FlexiSpy (Spyware)
  • Fuzzbunch (Exploit Framework)
  • GMBot (Android Trojan)
  • Gozi-ISFB - (Banking Trojan)
  • Grum (Spam Bot)
  • Hacking Team RCS (Remote Control System)
  • Hidden Tear (Ransom)
  • KINS (Banking Trojan)
  • Mirai (IoT Botnet)
  • Pony 2.0 (Stealer)
  • PowerLoader (Botnet)
  • RIG Front-end (Exploit Kit)
  • Rovnix (Bootkit)
  • Tinba (Tiny ASM Banking Trojan)
  • TinyNuke, Nuclear Bot, Micro Banking Trojan, NukeBot (Banking Trojan)
  • Trochilus, RedLeaves (RAT)
  • ZeroAccess (Toolkit for ZeroAccess/Sirefef v3)
  • Zeus (Banking Trojan)

Disclaimer

This repository is for research purposes only, the use of this code is your responsibility.

I take NO responsibility and/or liability for how you choose to use any of the source code available here. By using any of the files available in this repository, you understand that you are AGREEING TO USE AT YOUR OWN RISK. Once again, ALL files available here are for EDUCATION and/or RESEARCH purposes ONLY.