For educational purposes only, exhaustive samples of 500+ classic/modern trojan builders including screenshots.
β3,563Feb 20, 2026Updated last week
Alternatives and similar repositories for Ultimate-RAT-Collection
Users that are interested in Ultimate-RAT-Collection are comparing it to the libraries listed below
Sorting:
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.β439Dec 21, 2025Updated 2 months ago
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust π¦β3,300Feb 17, 2026Updated last week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,311Nov 12, 2025Updated 3 months ago
- AdaptixC2 is a highly modular advanced redteam toolkitβ2,733Updated this week
- Xeno-RAT is an open-source remote access tool (RAT) developed in C#, providing a comprehensive set of features for remote system managemeβ¦β1,478Mar 5, 2024Updated last year
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the β¦β1,821Nov 3, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDRβ3,155Mar 28, 2025Updated 10 months ago
- The Network Execution Toolβ5,279Updated this week
- EDR Lab for Experimentation Purposesβ1,411Jan 20, 2026Updated last month
- A modern 32/64-bit position independent implant templateβ1,293Mar 21, 2025Updated 11 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β507Aug 14, 2025Updated 6 months ago
- The Havoc Frameworkβ8,190Dec 18, 2025Updated 2 months ago
- π§ββοΈ Node.js Command & Control for Script-Jacking Vulnerable Electron Applicationsβ1,292Jun 17, 2025Updated 8 months ago
- ZigStrike, a powerful Payload Delivery Pipeline developed in Zig, offering a variety of injection techniques and anti-sandbox features.β502Jan 23, 2026Updated last month
- Real fucking shellcode encryptor & obfuscator toolβ1,012Jan 7, 2026Updated last month
- The recursive internet scanner for hackers. π§‘β9,450Updated this week
- Centralized resource for listing and organizing known injection techniques and POCsβ679Feb 1, 2026Updated 3 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom β¦β1,047Feb 16, 2026Updated last week
- Collection of Cyber Threat Intelligence sources from the deep and dark webβ6,585Updated this week
- A technique that can be used to bypass AV/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfveβ¦β592Jun 12, 2024Updated last year
- Collection of malware source code for a variety of platforms in an array of different programming languages.β17,842Sep 10, 2025Updated 5 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Powerβ¦β814Mar 28, 2025Updated 10 months ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.β2,260Feb 15, 2026Updated last week
- Windows Kernel Rootkit in Rustβ679Oct 10, 2025Updated 4 months ago
- Collection of various malicious functionality to aid in malware developmentβ1,838Feb 28, 2024Updated last year
- Adversary Emulation Frameworkβ10,717Updated this week
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.β281Apr 6, 2025Updated 10 months ago
- Dump cookies and credentials directly from Chrome/Edge process memoryβ1,403Jan 19, 2026Updated last month
- Awesome EDR Bypass Resources For Ethical Hackingβ1,484Jan 26, 2026Updated last month
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rustβ1,834Dec 29, 2025Updated last month
- Collect Windows telemetry for Maldevβ460Jan 30, 2026Updated 3 weeks ago
- Simulate the behavior of AV/EDR for malware development training.β561Feb 15, 2024Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.β1,199Oct 16, 2023Updated 2 years ago
- A set of fully-undetectable process injection techniques abusing Windows Thread Poolsβ1,246Dec 11, 2023Updated 2 years ago
- Now You See Me, Now You Don'tβ1,024Jan 23, 2026Updated last month
- Open-Source Remote Administration Tool For Windows C# (RAT)β2,849Oct 16, 2023Updated 2 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techniβ¦β1,367Oct 27, 2023Updated 2 years ago
- Collection of UAC Bypass Techniques Weaponized as BOFsβ607Feb 21, 2024Updated 2 years ago
- A resource containing all the tools each ransomware gangs usesβ1,330Dec 24, 2025Updated 2 months ago