Hi, this is Shmilt1. I have provided these proof of concepts to help people understand how malware really works and how it operates. This repository provides a couple of samples which you yourself can study and test in your own lab(s). The provided malware samples include the following:
- Trojans
- Spyware
- Fileless Malware
- Loaders
- Ransomware
- Cryptojackers
- etc.
If you want to help me with developing, finding and showcasing samples, feel free to do so by contributing to this repository.
Please do not use the provided samples on anyone without explicit permission
Most of these samples will either be collected from external sources and leaked source code or written directly by maintainers or contributors as proof of concepts. Rather than to look at the same binary blob gibberish and CPU instructions all the time in reverse engineering frameworks, it's also important to know how such software works and behaves. The easiest way to do that is by having access to its source code.
This repository is licensed under the Unlicense License, for more info read LICENSE.txt.