π CAUTION - Malicious files π
β49Feb 19, 2026Updated 2 months ago
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- virus collectionβ14Apr 13, 2021Updated 5 years ago
- π΅ A windows desktop program designed for one thing; to help you remove your data from 50+ people-search sites at the source. No cloud, nβ¦β37Feb 18, 2026Updated 2 months ago
- Automated NoSQL database enumeration and web application exploitation tool.β25May 6, 2019Updated 6 years ago
- A new approach to fighting cross-session tracking: multi-layer online fingerprint obfuscation. Spoofs browser/OS (headers & JS), hardwareβ¦β88Updated this week
- π₯ Pentest Cheat Sheetβ36Aug 10, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of malware samples caught by DIONAEA Honeypotβ12May 29, 2019Updated 6 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.β12Jan 12, 2026Updated 3 months ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β43Dec 2, 2020Updated 5 years ago
- The long shadow to emerge as other Git repositoriesβ18Feb 25, 2026Updated 2 months ago
- The_Scripter is tools for making pentesting easy. It contains lots of automation scripts like hash cracker, ssh_cracker,etc.β14Nov 25, 2022Updated 3 years ago
- β12Sep 22, 2022Updated 3 years ago
- A collection of malware samples.β39Dec 5, 2017Updated 8 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.β15Apr 13, 2023Updated 3 years ago
- Yet another OSINT automator.β18Nov 15, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Fast, cross-platform PowerShell module to find files & folders, grep file content, and measure sizesβLinux-style find/grep/du made simpleβ¦β22Apr 8, 2026Updated 3 weeks ago
- A curated collection of awesome malware, botnets, and other post-exploitation tools.β267Mar 14, 2021Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ17Dec 6, 2020Updated 5 years ago
- Sources Codes of many Office Malwaresβ18Sep 4, 2022Updated 3 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find themβ17Feb 1, 2021Updated 5 years ago
- Web application recon for bug bountyβ21Apr 19, 2020Updated 6 years ago
- Scripts and Tips for Kali Linux Pi-Tail Editionβ11Dec 8, 2023Updated 2 years ago
- π A small Password Attackβ15Apr 1, 2024Updated 2 years ago
- Exploits for different vulnerabilitiesβ12Nov 29, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SubDomain Finderβ13Nov 9, 2021Updated 4 years ago
- π Web Application Vulnerability Scanner πβ16May 21, 2022Updated 3 years ago
- Automated version of CVE-2018-14847 (MikroTik Exploit)β15Jun 12, 2025Updated 10 months ago
- Gmail shell, for hackers execute commands via gmailβ20Feb 3, 2021Updated 5 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windowsβ143Oct 3, 2023Updated 2 years ago
- β12Apr 8, 2022Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentestingβ24Aug 13, 2024Updated last year
- PAKURI-THON is a tool that supports pentesters with various pentesting tools and C4 server (command & control and chat & communication seβ¦β26Jul 18, 2022Updated 3 years ago
- β10Oct 8, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- React app for the Bold Subscriptions Manage Subscriptions pageβ15Sep 13, 2022Updated 3 years ago
- β13Dec 12, 2022Updated 3 years ago
- A proof-of-concept Node.js ransomwareβ20Mar 27, 2022Updated 4 years ago
- An advanced Bluetooth scanner for the ESP32 CYD device that monitors nearby Bluetooth devices and alerts you when new devices come withinβ¦β18Sep 22, 2024Updated last year
- Windows and MS-DOS malware samples repository.β155Nov 19, 2022Updated 3 years ago
- PHP ransomware that encrypts your files, as well as file and directory names.β113Apr 25, 2023Updated 3 years ago
- PEDA - Python Exploit Development Assistance for GDBβ24Aug 6, 2025Updated 8 months ago