Here are
9 public repositories
matching this topic...
Inject malicious code into *.debs
-
Updated
Apr 26, 2022
-
Python
Collection of various files from infected hosts
Source codes of malwares, stress tests etc. for computer.
JavaScript extracted from malicious PDF files using KoalaScanner.com
-
Updated
May 4, 2017
-
JavaScript
PowerShell InMemory Execution explained, with samples.
-
Updated
Mar 27, 2022
-
PowerShell
Malicious code behavior analysis system based on API hook.
Creating massive memory leaks using Python recursive instantiation
-
Updated
Dec 28, 2016
-
Python
Web shell written in php to exploit {Malicious File Upload}
Creating a Malicious HTML Document
Improve this page
Add a description, image, and links to the
maliciouscode
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
maliciouscode
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.