According to researchers, the malware hides behind icons from top networks such as Facebook, Instagram, Twitter, Google, YouTube, and Pinterest. Skimming attacks have lately beenRead more
No, not the one that nibbles at your Thanksgiving leftovers. RAT, Remote Access Trojan, is a type of malware that enables attackers to take overRead more
Yet Another Golang Binary Parser For IDAPro NOTE: This master branch is written in Python2 for IDAPython, and tested only on IDA7.2/IDA7.0. If you useRead more
The ShowStopper project is a tool to help malware researchers explore and test anti-debug techniques or verify debugger plugins or other solutions that clash withRead more
The purpose of the tool is to use artificial intelligence to mutate a malware (PE32 only) sample to bypass AI powered classifiers while keeping itsRead more
Malware Mutation using Deep Reinforcement Learning and GANs The purpose of the tool is to use artificial intelligence to mutate a malware (PE32 only) sampleRead more
The internet is an essential part of our life today, It comes with pros and cons which means nearly everyone faces threats of getting infectedRead more
Malware Source Code Collection !!! DISCLAIMER !!! We do not take any responsibility for any damage done by the code in this repository. Download, compileRead more
QBot is a malware that affects Windows users. QBot malware uses a fake Windows Defender theme. The goal is to trick the target into runningRead more
Thousands of MSSQL Databases has been infected with crypto-mining malware. Thousands of MSSQL Databases has been infected with crypto-mining malware. Hackers brute-forcing for weak passwordsRead more
Tesla CEO and co-founder have confirmed the report that the Tesla employee was approached by Russian national to install malware on Tesla Gigafactory Nevada earlierRead more
ADS goes here!If you don't see it, then please turn OFF
AD blocker for this website.
Our ads are not aggressive and help us
pay for the server and coffee.
THANK YOU for your support!