All Projects → Leurak → Memz

Leurak / Memz

A trojan made for Danooct1's User Made Malware Series.

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Memz

trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-91.41%)
Mutual labels:  malware, trojan
MalwareDatabase
One of the few malware collection
Stars: ✭ 37 (-92.94%)
Mutual labels:  malware, trojan
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-86.83%)
Mutual labels:  malware, trojan
Serpentine
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (-58.78%)
Mutual labels:  malware, trojan
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-49.81%)
Mutual labels:  malware, trojan
Goat
🐐 GoAT (Golang Advanced Trojan) is a trojan that uses Twitter as a C&C server
Stars: ✭ 218 (-58.4%)
Mutual labels:  malware, trojan
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (-27.48%)
Mutual labels:  malware, trojan
Spacecow
Windows Rootkit written in Python
Stars: ✭ 81 (-84.54%)
Mutual labels:  malware, trojan
TeleShadow2
TeleShadow - Telegram Desktop Session Stealer (Windows)
Stars: ✭ 88 (-83.21%)
Mutual labels:  malware, trojan
KeyPlexer
Capstone: Keylogger Trojan
Stars: ✭ 32 (-93.89%)
Mutual labels:  malware, trojan
Trojancockroach
A Stealthy Trojan Spyware
Stars: ✭ 424 (-19.08%)
Mutual labels:  malware, trojan
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-40.46%)
Mutual labels:  malware, trojan
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-74.24%)
Mutual labels:  malware, trojan
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (-41.79%)
Mutual labels:  malware, trojan
Teleshadow3
Telegram Desktop Session Stealer
Stars: ✭ 83 (-84.16%)
Mutual labels:  malware, trojan
cerberus research
Research tools for analysing Cerberus banking trojan.
Stars: ✭ 110 (-79.01%)
Mutual labels:  malware, trojan
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-96.95%)
Mutual labels:  malware, trojan
Brutus
A Python-powered exploitation framework and botnet.
Stars: ✭ 17 (-96.76%)
Mutual labels:  malware, trojan
RoboThief-Telegram-Session-Stealer
Robo Thief is a software for steal telegram session .
Stars: ✭ 18 (-96.56%)
Mutual labels:  malware, trojan
Adamantium Thief
🔑 Decrypt chromium based browsers passwords, cookies, credit cards, history, bookmarks, autofill. Version > 80 is supported.
Stars: ✭ 283 (-45.99%)
Mutual labels:  malware, trojan

MEMZ

A trojan made for Danooct1's User Made Malware Series.

I am not responsible for any damage made using this trojan.

The build scripts and converters for the MBR payload are very noobish. You will need some things to run these:

  • Python 2.7 for Windows and this library.
  • git for Windows or some other linux tools for windows like MinGW
  • NASM in your PATH (I just copyed the executable into C:\Windows\ because I was too lazy to add it to the PATH manually)
  • The Nyan Cat midi file
  • Something to convert binary files into C arrays, to embed the MBR payload into the trojan (I used the export function of the HxD hex editor, you will only need that if you changed and recompiled the MBR payload)
  • qemu for Windows (additional, if you want to test the payload)

Even if you have all of this I don't think you get this to compile because my scripts suck, as I said earlier.

If you want to use the exe to batch converter, don't forget to append -zip to it's command line, because this gives way smaller file sizes and also works on Windows XP.

You'll also need Visual Studio 2015 to build the actual Trojan. Make sure you selected the Release configuration, because Debug is not configured properly.

The ASM code may look very noobish, but this is my first big thing written in assembly.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].