For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
☆3,726Mar 29, 2026Updated last week
Alternatives and similar repositories for Ultimate-RAT-Collection
Users that are interested in Ultimate-RAT-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆455Mar 21, 2026Updated 2 weeks ago
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,509Mar 5, 2024Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,337Nov 12, 2025Updated 4 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,361Mar 4, 2026Updated last month
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,930Mar 22, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆510Mar 7, 2026Updated last month
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,308Mar 27, 2026Updated last week
- EDR Lab for Experimentation Purposes☆1,428Mar 1, 2026Updated last month
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,844Nov 3, 2024Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- A modern 32/64-bit position independent implant template☆1,313Mar 21, 2025Updated last year
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,181Mar 28, 2025Updated last year
- The Network Execution Tool☆5,393Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Real fucking shellcode encryptor & obfuscator tool☆1,014Jan 7, 2026Updated 3 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,067Mar 10, 2026Updated 3 weeks ago
- Open-Source Remote Administration Tool For Windows C# (RAT)☆2,886Oct 16, 2023Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,931Sep 10, 2025Updated 6 months ago
- The recursive internet scanner for hackers. 🧡☆9,583Updated this week
- Centralized resource for listing and organizing known injection techniques and POCs☆690Feb 1, 2026Updated 2 months ago
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆284Apr 6, 2025Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,766Updated this week
- Windows Kernel Rootkit in Rust☆681Oct 10, 2025Updated 5 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Adversary Emulation Framework☆10,958Updated this week
- Collection of various malicious functionality to aid in malware development☆1,866Feb 28, 2024Updated 2 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,295Feb 15, 2026Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆818Mar 28, 2025Updated last year
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆593Jun 12, 2024Updated last year
- Remote Access Trojan collection.(260+ RAT-Builders!)☆298Feb 26, 2022Updated 4 years ago
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- Now You See Me, Now You Don't☆1,040Jan 23, 2026Updated 2 months ago
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,857Dec 29, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Awesome EDR Bypass Resources For Ethical Hacking☆1,507Jan 26, 2026Updated 2 months ago
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,430Updated this week
- Inject DLLs into the explorer process using icons☆406May 18, 2025Updated 10 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- game of active directory☆7,669Mar 12, 2026Updated 3 weeks ago
- Stage 0☆168Dec 18, 2024Updated last year
- ☆569Mar 28, 2024Updated 2 years ago