Am0rphous / Malware
π CAUTION - Malicious files π
β42Updated 5 months ago
Alternatives and similar repositories for Malware:
Users that are interested in Malware are comparing it to the libraries listed below
- Script to facilitate different functions and checksβ47Updated 2 years ago
- Ro3b - Advance Banking HTTP Botnetβ49Updated last year
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloadsβ29Updated 4 years ago
- (Windows/Linux/Mac) Remote Administration Toolβ64Updated 4 years ago
- Keylogger using pynput + mail senderβ53Updated 4 years ago
- β51Updated 4 years ago
- Embedding executable files in PDF Documentsβ44Updated 6 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whicβ¦β40Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSecβ59Updated 3 years ago
- π¨π»βπ» A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.β40Updated 4 years ago
- β12Updated 2 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β40Updated 4 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.β63Updated 3 years ago
- β9Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord APIβ48Updated 3 years ago
- Easy to understand back door written in pythonβ34Updated 2 years ago
- Simple keylogger on C++ with several functions.β17Updated 4 years ago
- Fully Undetectable telegram Rat dropperβ33Updated 4 years ago
- β27Updated 4 years ago
- Repository of tools used in my blogβ51Updated last year
- A Simple Tool to Find Shells and Some Interesting Endpoints in Websitesβ32Updated 6 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.β37Updated 5 months ago
- blackhole is a ransomware coded in c#β27Updated 4 years ago
- Alien Logger is a MaaS (Malware as a Service) website offering an easier to use alternative from the traditional keylogger.β25Updated 3 years ago
- Community driven computer wormβ60Updated 2 years ago
- This repository contains a curated list of papers, articles and other sources related to remote access trojans.β35Updated 2 years ago
- Dogma V1.5.3β28Updated 5 years ago
- Powerful and smart Traffic Anonymizer using tor as a transparent proxyβ31Updated 2 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 2 years ago
- Helps To Bypass Av Sometimesβ17Updated 4 years ago