For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
☆3,639Mar 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for Ultimate-RAT-Collection
Users that are interested in Ultimate-RAT-Collection are comparing it to the libraries listed below
Sorting:
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆446Dec 21, 2025Updated 2 months ago
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system manageme…☆1,494Mar 5, 2024Updated 2 years ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,325Nov 12, 2025Updated 4 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,329Mar 4, 2026Updated 2 weeks ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,809Mar 10, 2026Updated last week
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.☆508Mar 7, 2026Updated last week
- EDR Lab for Experimentation Purposes☆1,417Mar 1, 2026Updated 2 weeks ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,299Jun 17, 2025Updated 9 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆512Aug 14, 2025Updated 7 months ago
- A modern 32/64-bit position independent implant template☆1,306Mar 21, 2025Updated 11 months ago
- The Havoc Framework☆8,245Dec 18, 2025Updated 3 months ago
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,828Nov 3, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,171Mar 28, 2025Updated 11 months ago
- The Network Execution Tool☆5,339Updated this week
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated 2 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,060Mar 10, 2026Updated last week
- Open-Source Remote Administration Tool For Windows C# (RAT)☆2,868Oct 16, 2023Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,887Sep 10, 2025Updated 6 months ago
- The recursive internet scanner for hackers. 🧡☆9,513Updated this week
- Centralized resource for listing and organizing known injection techniques and POCs☆687Feb 1, 2026Updated last month
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 11 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,668Updated this week
- Windows Kernel Rootkit in Rust☆679Oct 10, 2025Updated 5 months ago
- Collection of various malicious functionality to aid in malware development☆1,854Feb 28, 2024Updated 2 years ago
- Adversary Emulation Framework☆10,838Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated 11 months ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,280Feb 15, 2026Updated last month
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfve…☆592Jun 12, 2024Updated last year
- Remote Access Trojan collection.(260+ RAT-Builders!)☆296Feb 26, 2022Updated 4 years ago
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- Now You See Me, Now You Don't☆1,028Jan 23, 2026Updated last month
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,841Dec 29, 2025Updated 2 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,495Jan 26, 2026Updated last month
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,417Jan 19, 2026Updated 2 months ago
- Inject DLLs into the explorer process using icons☆408May 18, 2025Updated 10 months ago
- game of active directory☆7,581Mar 12, 2026Updated last week
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- Stage 0☆169Dec 18, 2024Updated last year
- Collect Windows telemetry for Maldev☆464Jan 30, 2026Updated last month