There are 4 repositories under malicious-code topic.
Be careful not to infect yourself when accessing and experimenting with malicious software.
Demonstrates how a malicious dependency could negatively impact the build output.
Analyze and Detect broken and malicious JS/TS modules.
Malware
Fake metasploit framework installer (written in C) that kills linux system with shell rm command when it gains root privileges.
Maleware Classification from their signature
The growing integration of intelligent gadgets and the World Wide Web has underscored the significance of Internet of Things (IoT) technologies in our everyday existence. These technologies play a crucial role in supporting manufacturing enterprises by providing real-time supervision of machinery statuses, product excellence, and environmental fact
Hackers attacks intercepted